A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
A FortiMail is configured with the protected domain example.com.On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.Which two settings should be used to configure the access receive rule? (Choose two.)
Refer to the exhibit which displays a topology diagram.Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, and Domain Settings — Other) of a FortiMail device.Which message size limit in KB will the FortiMail apply to outbound email?