Jump to content

[OFFER] Fortinet FortiMail 6.4 NSE6_FML-6.4 Exam Dumps-Exam Questions


MikeWolker

Recommended Posts

Hello!

The FortiMail 6.4 NSE6_FML-6.4 exam updated recently with many NEW questions.

NEW QUESTION 1
An administrator sees that an excessive amount of storage space on a FortiMail device is being used up by quarantine accounts for invalid users. The FortiMail is operating in transparent mode. Which two FortiMail features can the administrator configure to tackle this issue? (Choose two.)

A.    Automatic removal of quarantine accounts.
B.    Recipient address verification.
C.    Bounce address tag verification.
D.    Sender address rate control.

Answer: AD
Explanation:

This is the hidden content, please
(page 322-323)

NEW QUESTION 2
Which three statements about SMTPS and SMTP over TLS are true? (Choose three.)

A.    SMTP over TLS connections are entirely encrypted and initiated on port 465.
B.    SMTPS encrypts the identities of both the sender and receiver.
C.    The STARTTLS command is used to initiate SMTP over TLS.
D.    SMTPS encrypts only the body of the email message.
E.    SMTPS connections are initiated on port 465.

Answer: BCE
Explanation:

This is the hidden content, please

NEW QUESTION 3
Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers?

A.    Break the cluster, upgrade the units independently, and then form the cluster.
B.    Upgrade both units at the same time.
C.    Upgrade the standby unit, and then upgrade the active unit.
D.    Upgrade the active unit, which will upgrade the standby unit automatically.

Answer: B
Explanation:

This is the hidden content, please

NEW QUESTION 4
If you are using the built-in MTA to process email in transparent mode, which two statements about FortiMail behavior are true? (Choose two.)

A.    MUAs need to be configured to connect to the built-in MTA to send email.
B.    If you disable the built-in MTA, FortiMail will use its transparent proxies to deliver email.
C.    FortiMail can queue undeliverable messages and generate DSNs.
D.    FortiMail ignores the destination set by the sender, and uses its own MX record lookup to deliver email.

Answer: CD

NEW QUESTION 5
Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)

A.    execute formatmaildisk
B.    execute formatmaildisk_backup
C.    execute formatlogdisk
D.    execute partitionlogdisk 40

Answer: CD
Explanation:

This is the hidden content, please

This is the hidden content, please

NEW QUESTION 6
Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?

A.    Behavior analysis.
B.    Impersonation analysis.
C.    Content disarm and reconstruction.
D.    Header analysis.

Answer: C
Explanation:

This is the hidden content, please
(page 435)

NEW QUESTION 7
While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0. Which two reasons explain why the last policy ID value is 0? (Choose two.)

A.    Outbound email is being rejected.
B.    IP policy ID 2 has the exclusive flag set.
C.    There are no outgoing recipient policies configured.
D.    There are no access delivery rules configured for outbound email.

Answer: CD

NEW QUESTION 8
An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this?

A.    Resource profiles.
B.    Domain-level service settings.
C.    Access profiles.
D.    Address book management options.

Answer: A

NEW QUESTION 9
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

A.    Impersonation analysis.
B.    Bounce tag verification.
C.    Content disarm and reconstruction.
D.    Dictionary profile with predefined smart identifiers.

Answer: A

NEW QUESTION 10
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

A.    Policy configuration changes of all cluster members from the primary device.
B.    Firmware update of all cluster members from the primary device.
C.    Cross-device log searches across all cluster members from the primary device.
D.    Mail statistics of all cluster members on the primary device.

Answer: CD

......

For more new FortiMail 6.4 NSE6_FML-6.4 exam questions, contact me by visiting my profile page ("About me" tab) please.

Good luck!

  • Like 20
  • Thanks 9
  • Haha 1
Link to comment
Share on other sites

  • 2 weeks later...
  • 3 weeks later...
  • 5 months later...
  • 5 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...