A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identities that the DSNs were not generated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator enable to prevent this scenario?
Refer to the exhibit, which shows a partial antispam profile configuration.
What will happen to an email that triggers Spam outbreak protection?
Exhibit.
Refer to the exhibits, which show an email archiving configuration (Email Archiving 1 and Email Archiving 2) from a FortiMail device.
What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)
Which three configuration steps must you set to enable DKIM signing for outbound messages on FortiMail? (Choose three.}
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
Refer to the exhibit, which shows a topology diagram of two separate email domains.
Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)
In which two places can the maximum email size be overridden on FortiMail? (Choose two.)
A FortiMail device is configured with the protected domain example. com.
It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
Refer to the exhibits, which show a topology diagram (Topology) and a configurationelement (Access Control Rule.)
An administrator wants to configure an access receive rule to matchauthentication status on FML-1 for all outbound email from the example. co- domain.
Which two access receive rule settings must the administrator configure? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?