Practice Free FCP_FML_AD-7.4 Exam Online Questions
Which item is a supported one-time secure token for IBE authentication?
- A . FortiToken
- B . Certificate
- C . SMS
- D . Security question
What is the primary purpose of configuring anti-malware features in FortiMail?
- A . To optimize email delivery speed
- B . To encrypt email traffic
- C . To prevent the spread of malware through email attachments
- D . To create backups of email databases
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)
- A . The Sender IP/netmask should be set to 10.29.1.0/24.
- B . The Action should be set to Reject.
- C . The Recipient pattern should be set to *@example.com.
- D . The Authentication status should be set to Authenticated.
A FortiMail device is configured with the protected domain example.com.
If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
- A . MAIL FROM: [email protected] RCPT TO: [email protected]
- B . MAIL FROM: [email protected] RCPT TO: [email protected]
- C . MAIL FROM: [email protected] RCPT TO: [email protected]
- D . MAIL FROM: [email protected] RCPT TO: [email protected]
Which tasks are involved in configuring identity-based encryption (IBE)? (Select all that apply)
- A . Generating public and private key pairs for users
- B . Setting up a central certificate authority (CA)
- C . Defining user identities based on email addresses
- D . Creating email forwarding rules
- E . Configuring SMTPS for secure email transmission
Refer to the exhibit which displays a history log entry.
Why does the last field show SYSTEM in the Policy ID column?
- A . The email was dropped by a system blocklist.
- B . It is an inbound email.
- C . The email matched a system-level authentication policy.
- D . The email did not match a recipient-based policy.
Which features must be configured to ensure secure email communication in FortiMail? (Choose all that apply)
- A . TLS encryption
- B . Identity-Based Encryption (IBE)
- C . S/MIME certificates
- D . Email content filtering
Which type of attack involves tricking email recipients into revealing sensitive information, such as passwords or financial details, through fraudulent emails?
- A . Phishing
- B . Spamming
- C . Spoofing
- D . Spoofing
In Server Mode, how does FortiMail handle incoming emails?
- A . It scans the emails and forwards them without storing.
- B . It receives, stores, and processes emails directly.
- C . It bypasses scanning and directly delivers emails to the recipients.
- D . It only monitors email traffic without taking any action.
If legitimate emails are not being delivered to the recipient’s inbox, which FortiMail feature should you investigate?
- A . Recipient policies
- B . SPF records
- C . IP whitelisting
- D . Access control rules