لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which CLI command would you use to enable IBE for outgoing emails in FortiMail?
A. set encryption ibe enable
B. config email encryption ibecorrect
C. set mail-encryption ibe
D. config encryption ibe enable
عرض الإجابة
اجابة صحيحة: B
السؤال #2
What are the key considerations when deploying FortiMail in Transparent Mode? (Choose all that apply)
A. Ensuring network compatibility for email traffic relay
B. Configuring FortiMail to bypass encryption checks
C. Setting up FortiMail to monitor email traffic without altering it
D. Ensuring FortiMail can handle email attachments efficiently
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
What are the benefits of implementing SPF in FortiMail? (Choose all that apply)
A. Prevents email spoofingcorrect
B. Increases email delivery speed
C. Ensures email authenticationcorrect
D. Improves email encryption
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
Which tasks are involved in configuring identity-based encryption (IBE)? (Select all that apply)
A. Generating public and private key pairs for userscorrect
B. Setting up a central certificate authority (CA)
C. Defining user identities based on email addressescorrect
D. Creating email forwarding rules
E. Configuring SMTPS for secure email transmission
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
Refer to the exhibit, which displays an access control rule. What are two expected behaviors for this access control rule? (Choose two.)
A. Senders must be authenticated to match this rule
B. Emails must be sent from the 10
C. Email matching this rule will be relayed
D. Email must originate from an example
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
Which three configuration steps must you set to enable DKIM signing for outbound messages on FortiMail? (Choose three.}
A. Generate a public/private key pair in the protected domain configuration
B. Enable the DKIM checker in a matching session profile
C. Publish the public key as a TXT record in a public DNS server
D. Enable the DKIM checker in a matching antispam profile
E. Enable DKIM signing for outgoing messages in a matching session profile
عرض الإجابة
اجابة صحيحة: ACE
السؤال #7
Which security measures help prevent the spread of malware through email? (Choose all that apply)
A. Anti-malware scanningcorrect
B. DNSBL
C. Session-based filteringcorrect
D. Email archiving
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Which two types of remote authentication are supported for FortiMail administrator accounts? (Choose two.)
A. Single Sign-oncorrect
B. TACACS
C. Kerberos
D. RADIUScorrect
عرض الإجابة
اجابة صحيحة: AD
السؤال #9
Refer to the exhibit which displays a list of IBE users on a FortiMail device. Which statement describes the pre-registered status of the IBE user [email?protected] ?
A. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet
B. The user was registered by an administrator in anticipation of IBE participation
C. The user account has been de-activated, and the user must register again the next time they receive an IBE email
D. The user has completed the IBE registration process, but has not yet accessed their IBE email
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which protocol is primarily responsible for sending and receiving emails between mail servers?
A. HTTP
B. FTP
C. SMTPcorrect
D. SNMP
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which two statements describe the push delivery method used by IBE? (Choose two.)
A. Decrypted email is displayed using the HTTPS webmail interface
B. FortiMail generates a notification email message with an embedded HTTPS UR
C. FortiMail encrypts the email and adds it to a notification email as an HTML attachment
D. The recipient accesses the HTTPS link and logs in to the FortiMail secure message portal
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which part of the email header contains the recipient's email address?
A. To fieldcorrect
B. CC field
C. From field
D. Subject field
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which SMTP command lists (he supported SMTP service extensions of the recipient MTA?
A. EHLO
B. HELO
C. VRFY
D. DATA
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which two statements describe the push delivery method used by IBE? (Choose two.)
A. Decrypted email is displayed using the HTTPS webmail interface
B. FortiMail generates a notification email message with an embedded HTTPS UR
C. FortiMail encrypts the email and adds it to a notification email as an HTML attachment
D. The recipient accesses the HTTPS link and logs in to the FortiMail secure message portal
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A FortiMail device is configured with the protected domain example.com. If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
A. MAIL FROM:[email?protected]RCPT TO:[email?protected]correct
B. MAIL FROM:[email?protected]RCPT TO:[email?protected]correct
C. MAIL FROM:[email?protected]RCPT TO:[email?protected]
D. MAIL FROM:[email?protected]RCPT TO:[email?protected]
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
When would you typically deploy FortiMail in Transparent Mode?
A. When you need FortiMail to act as the primary mail server
B. When you want to enforce strict email encryption policies
C. When you want FortiMail to filter emails without changing DNS records
D. When you need to manage email storage and retrieval
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.
A. DESTINATION IP: 172
B. DESTINATION IP: 192
C. DESTINATION IP: 10
D. DESTINATION IP: 172
عرض الإجابة
اجابة صحيحة: AD
السؤال #18
Which traditional SMTP encryption method is commonly used to secure email transmission between servers?
A. HTTPS
B. S/MIME
C. TLS (Transport Layer Security)correct
D. SSH
عرض الإجابة
اجابة صحيحة: C
السؤال #19
During the initial deployment of FortiMail, what is the first step you should take to secure the device?
A. Configure high-availability clusters
B. Set up email encryption
C. Change default passwords and secure administrative access
D. Install additional security software
عرض الإجابة
اجابة صحيحة: C
السؤال #20
If emails from a particular sender are consistently marked as spam, which FortiMail feature should you check to resolve the issue?
A. SPF records
B. Access control rules
C. IP blacklisting
D. DKIM (DomainKeys Identified Mail)correct
عرض الإجابة
اجابة صحيحة: D
السؤال #21
How is the decryption process carried out in identity-based encryption (IBE)?
A. The sender provides the decryption key to the recipient
B. The recipient generates a decryption key based on their private key
C. The recipient's email client automatically decrypts the email
D. The sender's email server decrypts the email before delivery
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which tasks are involved in configuring secure MTA features in FortiMail? (Choose all that apply)
A. Enforcing email encryptioncorrect
B. Configuring DKIM (DomainKeys Identified Mail)correct
C. Enabling SMTP relay restrictionscorrect
D. Implementing SPF and DMARCcorrect
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #23
Which deployment scenarios are suitable for using Server Mode in FortiMail? (Choose all that apply)
A. Small businesses with minimal email traffic
B. Organizations needing full control over email processing
C. Environments where FortiMail will act as the sole mail server
D. High-traffic environments requiring rapid email delivery
عرض الإجابة
اجابة صحيحة: ABC
السؤال #24
Which technique checks whether the sender's IP address matches the domain from which the email claims to come, thus preventing email spoofing?
A. SPF (Sender Policy Framework)correct
B. DMARC (Domain-based Message Authentication, Reporting, and Conformance)
C. DKIM (DomainKeys Identified Mail)
D. DNSBL (Domain Name System Blacklist)
عرض الإجابة
اجابة صحيحة: A
السؤال #25
What are the benefits of configuring secure MTA features in FortiMail? (Choose all that apply)
A. Enhanced email securitycorrect
B. Improved email delivery speed
C. Prevention of unauthorized email relaycorrect
D. Increased resistance to spamcorrect
عرض الإجابة
اجابة صحيحة: ACD
السؤال #26
If emails from a particular sender are consistently marked as spam, which FortiMail feature should you check to resolve the issue?
A. SPF records
B. Access control rules
C. IP blacklisting
D. DKIM (DomainKeys Identified Mail)correct
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which authentication protocol is commonly used for secure email communication and ensures that emails are encrypted during transmission?
A. HTTPS
B. POP3
C. SMTPScorrect
D. Telnet
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Which authentication protocol is commonly used for secure email communication and ensures that emails are encrypted during transmission?
A. HTTPS
B. POP3
C. SMTPScorrect
D. Telnet
عرض الإجابة
اجابة صحيحة: C
السؤال #29
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
A. mx
B. The primary MTA for the example
C. The external MTAs will send email to mx
D. The PriNS server should receive all email for the example
عرض الإجابة
اجابة صحيحة: BC
السؤال #30
Which tasks are involved in configuring secure MTA features in FortiMail? (Choose all that apply)
A. Enforcing email encryptioncorrect
B. Configuring DKIM (DomainKeys Identified Mail)correct
C. Enabling SMTP relay restrictionscorrect
D. Implementing SPF and DMARCcorrect
عرض الإجابة
اجابة صحيحة: ABCD

View The Updated Fortinet Exam Questions

SPOTO Provides 100% Real Fortinet Exam Questions for You to Pass Your Fortinet Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: