試験の準備方法-権威のあるFCP_FML_AD-7.4学習体験談試験-正確的なFCP_FML_AD-7.4合格体験談君はほかのサイトや書籍もブラウズ するがもしれませんが、弊社の関連のFCP_FML_AD-7.4学習資料と比較してからTopexamの商品の範囲が広くてまたネット上でダウンロードを発見してしまいました。Topexamだけ全面と高品質の問題集があるのではTopexamの専門家チームが彼らの長年のFortinet知識と豊富な経験で研究してしました。そして、Topexamに多くのFCP_FML_AD-7.4受験生の歓迎されます。 Fortinet FCP - FortiMail 7.4 Administrator 認定 FCP_FML_AD-7.4 試験問題 (Q21-Q26):質問 # 21
Refer to the exhibits showing SMTP limits (Session Profile - SMTP Limits), and domain settings (Domain Settings, andDomain Settings - Other) of a FortiMail device.
Which message size limit in KB will the FortiMail apply to outbound email?
A. 0
B. There is no message size limit for outbound email from a protected domain.
C. 1
D. 2
正解:A
質問 # 22
Exhibit.
Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)
A. FortiMail will enforce SMTPS on all outbound sessions.
B. FortiMail will support the STARTTLS extension.
C. FortiMail will drop any inbound plaintext SMTP connection.
D. FortiMail will accept SMTPS connections.
正解:B、D
質問 # 23
Which two antispam techniques query FortiGuard for rating information? (Choose two.)
A. URL filter
B. DNSBL
C. IP reputation
D. SURBL
正解:A、C
解説:
URL filter: Queries FortiGuard's constantly updated web-rating database to check URLs in messages.
IP reputation: Uses FortiGuard's reputation service to look up sender IP addresses.
質問 # 24
Refer to the exhibit, which displays the domain configuration of a FortiMail device running in transparent mode.
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
A. BDESTINATION IP:10.25.32.15 MAIL FROM: trainir.g@example.com RCPT TO: students@external.
com
B. DESTINATIONIP:172.16.32.56 MAIL FROM: misfihosted.net RCPT TO: noc9example.com
C. DESTINATION IP:172.16.32.56 MAIL FROM: support@example.com RCPT TO:marketingeaxampla.com
D. DESTINATIONIP:192.163.54.10 MAIL FROM: accour.t3@exaraple.com RCPT TO: saleseexamplc.
com
正解:A、D
質問 # 25
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
A. Content disarm and reconstruction
B. Bounce tag verification
C. Impersonation analysis
D. Dictionary profile with predefined smart identifiers