On a FortiMail unit, access control rules specify actions to be taken against matching email messages. Which of the following statements correctly describes the Bypass action?
When using Sender Reputation on a FortiMail unit, which of the following actions can be taken against a source IP address generating spam or invalid email
messages?