2023年最新の有効なNSE6_FML-6.4テスト解答とFortinet試験PDF問題を試そう [Q10-Q26]

Share

2023年最新の有効なNSE6_FML-6.4テスト解答とFortinet試験PDF問題を試そう

無料Fortinet NSE6_FML-6.4試験問題と解答トレーニングを提供していますJPNTest


NSE6_FML-6.4試験は、電子メールセキュリティの基礎、電子メールフィルタリングとルーティング、電子メール暗号化、電子メールアーカイブなど、FortiMail 6.4に関連する幅広いトピックをカバーしています。試験では、候補者がアンチスパム、アンチウイルス、データ漏洩防止などのさまざまなFortiMail機能を設定および管理する能力もテストされます。さらに、試験では、候補者が一般的なFortiMailの問題をトラブルシューティングし、基本的なメンテナンスタスクを実行する能力も評価されます。

 

質問 # 10
Examine the FortiMail antivirus action profile shown in the exhibit; then answer the question below.

What is the expected outcome if FortiMail applies this action profile to an email? (Choose two.)

  • A. Virus content will be removed from the email
  • B. The sanitized email will be sent to the recipient's personal quarantine
  • C. A replacement message will be added to the email
  • D. The administrator will be notified of the virus detection

正解:A、C


質問 # 11
Examine the FortiMail archiving policies shown in the exhibit; then answer the question below.


Which of the following statements is true regarding this configuration? (Choose two.)

  • A. Email sent from [email protected] will be archived
  • B. Only the [email protected] account will be able to access the archived email
  • C. Archived email will be saved in the journal account
  • D. Spam email will be exempt from archiving

正解:C、D


質問 # 12
Which statement about how impersonation analysis identifies spoofed email addresses is correct?

  • A. It uses SPF validation to detect spoofed addresses.
  • B. It uses behavior analysis to detect spoofed addresses.
  • C. It maps the display name to the correct recipient email address.
  • D. It uses DMARC validation to detect spoofed addresses.

正解:B


質問 # 13
Refer to the exhibit.



Which of the following statements are true regarding the transparent mode FortiMail's email routing for the example.com domain? (Choose two.)

  • A. If incoming email are undeliverable, FML-1 can queue them to retry again later
  • B. If outgoing email messages are undeliverable, FML-1 can queue them to retry later
  • C. FML-1 will use the transparent proxy for incoming sessions
  • D. FML-1 will use the built-in MTA for outgoing sessions

正解:A、C


質問 # 14
Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)

  • A. execute formatmaildisk_backup
  • B. execute formatmaildisk
  • C. execute formatlogdisk
  • D. execute partitionlogdisk 40

正解:C、D


質問 # 15
Examine the access receive rule shown in the exhibit; then answer the question below.

Which of the following statements are true? (Choose two.)

  • A. Email from any host in the 10.0.1.0/24 subnet can match this rule
  • B. Email must originate from an example.com email address to match this rule
  • C. Senders must be authenticated to match this rule
  • D. Email matching this rule will be relayed

正解:B、D


質問 # 16
Refer to the exhibit.

Which statement describes the pre-registered status of the IBE user [email protected]?

  • A. The user has completed the IBE registration process, but has not yet accessed their IBE email.
  • B. The user was registered by an administrator in anticipation of IBE participation.
  • C. The user account has been de-activated, and the user must register again the next time they receive an IBE email.
  • D. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.

正解:A


質問 # 17
While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0.
Which two reasons explain why the last policy ID value is 0? (Choose two.)

  • A. There are no outgoing recipient policies configured
  • B. IP policy ID 2 has the exclusive flag set
  • C. Outbound email is being rejected
  • D. There are no access delivery rules configured for outbound email

正解:A、D


質問 # 18
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

  • A. Mail statistics of all cluster members on the primary device.
  • B. Cross-device log searches across all cluster members from the primary device.
  • C. Firmware update of all cluster members from the primary device.
  • D. Policy configuration changes of all cluster members from the primary device.

正解:A、B


質問 # 19
Refer to the exhibit.

Which two statements about the MTAs of the domain example.com are true? (Choose two.)

  • A. The higher preference value is used to load balance more email to the mx.example.com MTA
  • B. The primary MTA for the example.com domain is mx.hosted.com
  • C. The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable
  • D. The PriNS server should receive all email for the example.com domain

正解:B、C


質問 # 20
What three configuration steps are required to enable DKIM signing for outbound messages on FortiMail? (Choose three.)

  • A. Publish the public key as a TXT record in a public DNS server
  • B. Generate a public/private key pair in the protected domain configuration
  • C. Enable DKIM check in a matching antispam profile
  • D. Enable DKIM signing for outgoing messages in a matching session profile
  • E. Enable DKIM check in a matching session profile

正解:A、B、E


質問 # 21
Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?

  • A. Behavior analysis
  • B. Impersonation analysis
  • C. Header analysis
  • D. Content disarm and reconstruction

正解:D


質問 # 22
A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

正解:C、D


質問 # 23
Refer to the exhibit.

Which two message types will trigger this DLP scan rule? (Choose two.)

  • A. An email message that contains credit card numbers in the body will trigger this scan rule
  • B. An email message with a subject that contains the term "credit card" will trigger this scan rule
  • C. An email sent from [email protected] will trigger this scan rule, even without matching any conditions
  • D. An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule

正解:A、D


質問 # 24
Examine the FortiMail IBE users shown in the exhibit; then answer the question below

Which one of the following statements describes the Pre-registered status of the IBE user [email protected]?

  • A. The user has completed the IBE registration process but has not yet accessed their IBE email
  • B. The user was registered by an administrator in anticipation of IBE participation
  • C. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet
  • D. The user account has been de-activated, and the user must register again the next time they receive an IBE email

正解:C


質問 # 25
Refer to the exhibit.

For the transparent mode FortiMail shown in the exhibit, which two sessions are considered incoming sessions? (Choose two.)

正解:C、D


質問 # 26
......

トップクラスFortinet NSE6_FML-6.4オンライン問題集:https://www.jpntest.com/shiken/NSE6_FML-6.4-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡