Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

NSE6_FML-6.4 Fortinet NSE 6 - FortiMail 6.4 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Fortinet NSE6_FML-6.4 Fortinet NSE 6 - FortiMail 6.4 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 56 questions

Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.

After creating the policy, an administrator discovered that clients are able to send unauthenticated email using SMTP. What must be done to ensure clients cannot send unauthenticated email?

A.

Configure a matching IP policy with SMTP authentication and exclusive flag enabled

B.

Move the recipient policy to the top of the list

C.

Configure an access receive rule to verify authentication status

D.

Configure an access delivery rule to enforce authentication

What are the configuration steps to enable DKIM signing for outbound messages on FortiMail? (Choose three.)

A.

Enable DKIM signing for outgoing messages in a matching session profile

B.

Publish the public key as a TXT record in a public DNS server

C.

Enable DKIM check in a matching session profile

D.

Enable DKIM check in a matching antispam profile

E.

Generate a public/private key pair in the protected domain configuration

Examine the FortiMail antivirus action profile shown in the exhibit; then answer the question below.

What is the expected outcome if FortiMail applies this action profile to an email? (Choose two.)

A.

The sanitized email will be sent to the recipient’s personal quarantine

B.

A replacement message will be added to the email

C.

Virus content will be removed from the email

D.

The administrator will be notified of the virus detection

Examine the access receive rule shown in the exhibit; then answer the question below.

Which of the following statements are true? (Choose two.)

A.

Email from any host in the 10.0.1.0/24 subnet can match this rule

B.

Senders must be authenticated to match this rule

C.

Email matching this rule will be relayed

D.

Email must originate from an example.com email address to match this rule

Examine the FortiMail archiving policies shown in the exhibit; then answer the question below.

Which of the following statements is true regarding this configuration? (Choose two.)

A.

Spam email will be exempt from archiving

B.

Email sent from marketing@example.com will be archived

C.

Archived email will be saved in the journal account

D.

Only the marketing@example.com account will be able to access the archived email

Examine the FortMail mail server settings shown in the exhibit; then answer the question below.

Which of the following statements are true? (Choose two.)

A.

mx.example.com will enforce SMTPS on all outbound sessions

B.

mx.example.com will display STARTTLS as one of the supported commands in SMTP sessions

C.

mx.example.com will accept SMTPS connections

D.

mx.example.com will drop any inbound plaintext SMTP connection

What IP address should the DNS MX record for this deployment resolve to?

A.

172.16.32.1

B.

172.16.32.57

C.

172.16.32.55

D.

172.16.32.56

Which of the following antispam techniques queries FortiGuard for rating information? (Choose two.)

A.

URI filter

B.

IP reputation

C.

SURBL

D.

DNSBL

Refer to the exhibit.

For the transparent mode FortiMail shown in the exhibit, which two sessions are considered incoming sessions? (Choose two.)

A.

DESTINATION IP: 172.16.32.56 MAIL FROM: support@example.com RCPT TO: marketing@example.com

B.

DESTINATION IP: 192.168.54.10 MAIL FROM: accounts@example.com RCPT TO: sales@example.com

C.

DESTINATION IP: 10.25.32.15 MAIL FROM: training@example.com RCPT TO: students@external.com

D.

DESTINATION IP: 172.16.32.56 MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9.

Which two scenarios will generate this policy ID? (Choose two.)

A.

Email was processed using IP policy ID 4

B.

Incoming recipient policy ID 9 has the exclusive flag set

C.

FortiMail applies the default behavior for relaying inbound email

D.

FortiMail configuration is missing an access delivery rule

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.

What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Bounce tag verification

C.

Content disarm and reconstruction

D.

Dictionary profile with predefined smart identifiers

What three configuration steps are required to enable DKIM signing for outbound messages on FortiMail? (Choose three.)

A.

Generate a public/private key pair in the protected domain configuration

B.

Enable DKIM check in a matching session profile

C.

Enable DKIM check in a matching antispam profile

D.

Publish the public key as a TXT record in a public DNS server

E.

Enable DKIM signing for outgoing messages in a matching session profile

Refer to the exhibit.

Which message size limit will FortiMail apply to the outbound email?

A.

204800

B.

1024

C.

51200

D.

10240

Refer to the exhibit.

Which two statements about email messages sent from User A to User B are correct? (Choose two.)

A.

User A's MUA will perform a DNS MX record lookup to send the email message.

B.

mx.example1.org will forward the email message to the MX record that has the lowest preference.

C.

The DNS server will act as an intermediary MTA.

D.

User B will retrieve the email message using either POP3 or IMAP.

Refer to the exhibit.

MTA-1 is delivering an email intended for User 1 to MTA-2.

Which two statements about protocol usage between the devices are true? (Choose two.)

A.

User 1 will use logs were generated load the email message from MTA-2

B.

MTA-2 will use IMAP to receive the email message from MTA-1

C.

MTA-1 will use POP3 to deliver the email message to User 1 directly

D.

MTA-1 will use SMTP to deliver the email message to MTA-2

Refer to the exhibit.

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which two settings should be used to configure the access receive rule? (Choose two.)

A.

The Recipient pattern should be set to *@example.com

B.

The Authentication status should be set to Authenticated

C.

The Sender IP/netmask should be set to 10.29.1.0/24

D.

The Action should be set to Reject

Page: 1 / 1
Total 56 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved