Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration).What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
Refer to the exhibit which displays a history log entry.Why does the last field show SYSTEM in the Policy ID column?
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.Which two statements describe what this policy ID means? (Choose two.)