Questions for the FCP FML AD 7 4 were updated on : Nov 23 ,2025
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.
Which IP address must the DNS MX record for this organization resolve to?
C
While reviewing logs, an administrator discovers that an incoming email was processed using policy
IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
CD
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
B, C
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
B
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
A, B
Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device
configurations (FML1 Configuration and FML2 Configuration).


What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
D
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send
unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
D
Refer to the exhibit which shows a detailed history log view.
Which two actions did FortiMail take on this email message? (Choose two.)
A, B
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their
protected domain. After searching the logs, the administrator identifies that the DSNs were not
generated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator use to prevent this scenario?
D
In which FortiMail configuration object can you assign an outbound session profile?
C
What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high?
(Choose two.)
B, C
Which item is a supported one-time secure token for IBE authentication?
D
In which two places can the maximum email size be overridden on FortiMail? (Choose two.)
B, C
Refer to the exhibit which displays a list of IBE users on a FortiMail device.
Which statement describes the pre-registered status of the IBE user [email protected]?
A
Refer to the exhibit which displays a topology diagram.
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail?
(Choose two.)
B, C