Fortinet NSE6_FML-7.2 Exam (page: 2)
Fortinet NSE 6 - FortiMail 7.2
Updated on: 12-Feb-2026

Viewing Page 2 of 8

Refer to the exhibit which shows a command prompt output of a telnet command.



Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

  1. Change the host name
  2. Add a protected domain
  3. Configure a local domain name
  4. Change the operation mode

Answer(s): A



Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.





Which two message types will trigger this DLP scan rule? (Choose two.)

  1. An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.
  2. An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.
  3. An email message with a subject that contains the term "credit card' will trigger this scan rule.
  4. An email message that contains credit card numbers in the body will trigger this scan rule.

Answer(s): C,D



A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.
What option can the administrator configure to prevent these types of attacks?

  1. Impersonation analysis
  2. Dictionary profile with predefined smart identifiers
  3. Bounce tag verification
  4. Content disarm and reconstruction

Answer(s): A



A FortiMail is configured with the protected domain example.com.

On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

  1. MAIL FROM: mis@hosted.net RCPT TO: noc@example.com
  2. MAIL FROM: accounts@example.com RCPT TO: sales@external.org
  3. MAIL FROM: support@example.com RCPT TO: marketing@example.com
  4. MAIL FROM: training@external.org RCPT TO: students@external.org

Answer(s): A,C



Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).





An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.

Which two settings should be used to configure the access receive rule? (Choose two.)

  1. The Sender IP/netmask should be set to 10.29.1.0/24.
  2. The Action should be set to Reject
  3. The Recipient pattern should be set to · @example. com.
  4. The Authentication status should be set to Authenticated

Answer(s): A,D



Viewing Page 2 of 8



Share your comments for Fortinet NSE6_FML-7.2 exam with other users:

Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA