Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
Refer to the exhibit which displays a topology diagram.
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
Refer to the exhibit, which shows a few lines of FortiMail logs.
Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs were not generated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator use to prevent this scenario?
Refer to the exhibit which displays a history log entry.
Why does the last field show SYSTEM in the Policy ID column?
A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)