Fortinet Related Exams
NSE6_FML-7.2 Exam
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.
Which IP address must the DNS MX record for this organization resolve to?