1.
On a FortiMail unit, access control rules specify actions to be taken against matching email messages. Which of the following statements correctly describes the Bypass action?
2.
Which of the following FortiMail profile types apply to IP-based policies only?
3.
According to the Message Header printed below, which antispam technique detected this email as spam:
Return-Path: user1@external.lab
(SquirrelMail authenticated user user1)
by 172.16.78.8 with HTTP;
X-FEAS-HASH: 6ef419f0a0608b1655xxxxe68080df3cb12fc38f1118d2f085985eeb000274d7
Sat, 18 Apr 2009 15:53:06 +0200 (CEST)
Message-ID : <3029.192.168.3.101.1240062786.squirrel@172.16.78.8>
Date : Sat, 18 Apr 2009 15 :53 :06 +0200 (CEST)
Subject: [SPAM] Sales
From: user1@external.lab
To: user1@training1.lab
User-Agent: SquirrelMail/1.4.10a-1.fc6
MIME-Version : 1.0
Content-Type : text/plain ;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Original-To: user1@training1.lab
Delivered-To: user1@training.lab
Received: from fm.sub.training1.lab (fm.sub.training1.lab [192.168.11.101])
by mail.training.lab (Postfix) with ESMTP id A9160187073
for ; Sun, 19 Apr 2009 16:58:48 +0200 (CEST)
Received: from mail.external.lab ([172.16.78.8])
by fm.sub.training1.lab with ESMTP id n3LEPHWu001093
for ; Tue, 21 Apr 2009 10:25:17 -0400
Received: from 172.16.78.8 (localhost [127.0.0.1])
by mail.external.lab (Postfix) with ESMTP id 247D9BF893
for ; Sat, 18 Apr 2009 15:53:06 +0200 (CEST)
Received: from 192.168.3.101
4.
Which of the following statements is true regarding Session-based antispam techniques?
5.
Which of the following statements regarding the FortiMail unit's Greylisting feature is NOT correct?
6.
Which of the following is an advantage of using Banned Word scanning instead of Dictionary scanning?
7.
Which operation is performed by the Forged IP scanning technique?
8.
When using Sender Reputation on a FortiMail unit, which of the following actions can be taken against a source IP address generating spam or invalid email messages?
9.
Which of the following statements is true regarding oversized emails?
10.
Which of the following statements regarding Antivirus scanning is NOT correct?