Practice Free FCP_FML_AD-7.4 Exam Online Questions
What is the primary purpose of session-based email filtering in FortiMail?
- A . To analyze email headers and footers for authenticity
- B . To monitor email attachment sizes
- C . To scan and filter email traffic in real-time during a session
- D . To archive all incoming and outgoing emails
Refer to the exhibit, which shows the HA configuration of a FortiMail device.
Which two steps are the minimum configuration steps required to configure an active-passive cluster? (Choose two.)
- A . Add the IP addresses of the secondary devices that will be members of the cluster.
- B . In the HA mode drop-down list, select Primary.
- C . In the Shared password field, type the same password that is used for all of the clustered devices.
- D . In the HA base port field, change the value to 22000.
What is the primary purpose of an initial deployment and basic configuration of FortiMail?
- A . To establish high availability clusters.
- B . To fine-tune system settings for optimal performance.
- C . To ensure the device is operational and secure within the network.
- D . To monitor and troubleshoot deployment issues.
Which technique is commonly used to identify and filter spam emails based on a list of known malicious email addresses?
- A . DNSBL (Domain Name System Blacklist)
- B . SPF (Sender Policy Framework)
- C . DKIM (DomainKeys Identified Mail)
- D . TLS (Transport Layer Security)
What is the primary difference between Server Mode and Transparent Mode in FortiMail?
- A . Server Mode requires direct email delivery, while Transparent Mode acts as a relay.
- B . Server Mode encrypts emails, while Transparent Mode does not.
- C . Server Mode is used for small networks, while Transparent Mode is for large networks.
- D . Server Mode bypasses email scanning, while Transparent Mode enforces it.
What is the primary purpose of Identity-Based Encryption (IBE) in FortiMail?
- A . To encrypt emails based on the content of the message.
- B . To ensure that only authorized recipients can decrypt and read the email.
- C . To reduce the size of email attachments.
- D . To increase the speed of email delivery.
When deploying FortiMail in transparent mode, which of the following statements are true? (Select all that apply)
- A . FortiMail acts as an intermediary for email traffic.
- B . Email attachments are automatically encrypted.
- C . Transparent mode requires changes to the mail server’s IP address.
- D . FortiMail’s functions are hidden from the email server.
- E . Transparent mode is suitable for organizations with complex email infrastructures.
Refer to the exhibit, which shows the HA configuration of a FortiMail device.
What are the minimum configuration changes required to deploy this FortiMail device as a config-secondary in a config-only cluster? (Choose two.)
- A . In the HA base port field, change the value to 8890.
- B . In the Primary IP address field, type the config-primary FortiMail IP address.
- C . In the Shared password field, type the same password as the one configured on the config-primary FortiMail.
- D . In the HA mode drop-down list, select Secondary.
Which CLI command is used to configure SPF records in FortiMail?
- A . config email spf
- B . set spf-policy
- C . config policy spf
- D . config spf settings
When deploying FortiMail in transparent mode, what role does FortiMail play in the email flow?
- A . FortiMail serves as the primary mail server.
- B . FortiMail decrypts all incoming emails.
- C . FortiMail operates as a transparent proxy for incoming and outgoing emails.
- D . FortiMail exclusively handles email encryption.