Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

FCP_FML_AD-7.4 FCP - FortiMail 7.4 Administrator Questions and Answers

Questions 4

Refer to the exhibit.

What does the Scan timeout value configure?

Options:

A.

How long FortiMail will waitfor a scan result from FortiSandbox

B.

How often the local scan results cache will expire on FortiMail

C.

How often FortiMail will query FortiSandbox for a scan result

D.

How long FortiMail will wait to send a file or URI to FortiSandbox

Buy Now
Questions 5

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identities that the DSNs were not generated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator enable to prevent this scenario?

Options:

A.

Spoofed header detection

B.

Spam outbreak protection.

C.

FortiGuard IP Reputation

D.

Bounce address tag validation

Buy Now
Questions 6

Refer to the exhibit, which shows a partial antispam profile configuration.

What will happen to an email that triggers Spam outbreak protection?

Options:

A.

The email is logged.

B.

The email is rejected.

C.

The email is held in a deferred queue for a period of time.

D.

The email is marked as clean and released to the recipient.

Buy Now
Questions 7

Which item is a supported one-time secure token for IBE authentication?

Options:

A.

FortiToken

B.

Certificate

C.

SMS

D.

Security question

Buy Now
Questions 8

Exhibit.

Refer to the exhibits, which show an email archiving configuration (Email Archiving 1 and Email Archiving 2) from a FortiMail device.

What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)

Options:

A.

FortiMail will save archived email in the journal account.

B.

FortiMail will archive email sent from marketingexample. com.

C.

FortiMail will exempt spam email from archiving.

D.

FortiMail will allow only the marketingeexample.com account to access the archived email.

Buy Now
Questions 9

Which three configuration steps must you set to enable DKIM signing for outbound messages on FortiMail? (Choose three.}

Options:

A.

Generate a public/private key pair in the protected domain configuration.

B.

Enable the DKIM checker in a matching session profile.

C.

Publish the public key as a TXT record in a public DNS server.

D.

Enable the DKIM checker in a matching antispam profile.

E.

Enable DKIM signing for outgoing messages in a matching session profile.

Buy Now
Questions 10

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

Options:

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule toverifyauthentication status.

Buy Now
Questions 11

Refer to the exhibit, which shows a topology diagram of two separate email domains.

Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)

Options:

A.

mx.example1.org will forward the email message to the MX record that has the lowest preference.

B.

User B will retrieve the email message using either POP3 or IMAP.

C.

User A’s MUA will perform a DNS MX record lookup to send the email message.

D.

The DNS server will act as an intermediary MTA.

Buy Now
Questions 12

In which two places can the maximum email size be overridden on FortiMail? (Choose two.)

Options:

A.

IP Policy configuration

B.

Protected Domain configuration

C.

Resource Profile configuration

D.

Session Profile configuration

Buy Now
Questions 13

A FortiMail device is configured with the protected domain example. com.

It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

Options:

A.

MALL FROM: mis@hosted.r.et RCPTTO: noc@exampIe.com

B.

MALL FROM: accounts@example.com RCPT TO: aales8biz.example.com

C.

MALL FROM: support6example.org RCPT TO: marketing9exainple.com

D.

MALL FROM: trainingeexample.com RCPT TO: students@external.org

Buy Now
Questions 14

Refer to the exhibits, which show a topology diagram (Topology) and a configurationelement (Access Control Rule.)

An administrator wants to configure an access receive rule to matchauthentication status on FML-1 for all outbound email from the example. co- domain.

Which two access receive rule settings must the administrator configure? (Choose two.)

Options:

A.

The Sender IP/netmask must be set to 10.29.1.0/24.

B.

A TLS profile must be configured and applied.

C.

The Recipient pattern must be set to *@example. com.

D.

The Authentication status must be set to Authenticated

Buy Now
Questions 15

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Buy Now
Exam Code: FCP_FML_AD-7.4
Exam Name: FCP - FortiMail 7.4 Administrator
Last Update: Aug 17, 2025
Questions: 53
FCP_FML_AD-7.4 pdf

FCP_FML_AD-7.4 PDF

$29.75  $84.99
FCP_FML_AD-7.4 Engine

FCP_FML_AD-7.4 Testing Engine

$35  $99.99
FCP_FML_AD-7.4 PDF + Engine

FCP_FML_AD-7.4 PDF + Testing Engine

$47.25  $134.99