In which FortiMail configuration object can you assign an outbound session profile?
A. Outbound recipient policyRefer to the exhibits which show a topology diagram (Topology) and a configuration element (Access Control Rule).


Which three access control settings are recommended to allow outbound email from the example.com domain on FML-1? (Choose three.)
A. The Sender IP/netmask should be set to 10.29.1.45/32.Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).


An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which two settings should be used to configure the access receive rule? (Choose two.)
A. The Sender IP/netmask should be set to 10.29.1.0/24.In which two places can the maximum email size be overridden on FortiMail? (Choose two.)
A. IP Policy configurationA FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs were not generated because of any outbound email sent from their organization. Which FortiMail antispam technique can the administrator use to prevent this scenario?
A. FortiGuard IP ReputationRefer to the exhibit which displays a list of IBE users on a FortiMail device.

Which statement describes the pre-registered status of the IBE user extuser2@external.lab?
A. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.

Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
A. mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL. Which two statements describe what this policy ID means? (Choose two.)
A. Access control policy number 9 was used.What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)
A. High aggressiveness scan settings do not support executable file types.A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
A. MAIL FROM: mis@hosted.net RCPT TO: noc@example.comNowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NSE6_FML-7.2 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.