<< Prev Question Next Question >>

Question 22/60

In a server mode config-only cluster, where is the mail data stored? (Choose one.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: What actions can a FortiADC take for HTTP traffic that is co...
Question 2: When FortiMail is operating is transparent mode, SMTP sessio...
Question 3: For the case of outbound link load balancing, which upstream...
Question 4: A device that is 802.1X non-compliant must be connected to t...
Question 5: FortiGate is configured to send suspicious files to a FortiS...
Question 6: What is a primary motivating factor for choosing FortiMail t...
Question 7: You are a FortiAuthenticator administrator for a large organ...
Question 8: Which protocols can FortiSandbox use to connect to a network...
Question 9: Which of the following statements about virtual tunneling fo...
Question 10: An administrator is running the following sniffer in a Forti...
Question 11: Which configuration elements must be in place for the FortiA...
Question 12: Which is true regarding Microsoft Office on FortiSandbox?...
Question 13: The Windows licenses in a FortiSandbox could be locked becau...
Question 14: Which is not a supported captive portal authentication metho...
Question 15: What statement is true for the self-service portal? (Choose ...
Question 16: Two FortiADC devices (ADC-1 and ADC-2) form an HA cluster. T...
Question 17: Access delivery rules provide which two of the following fun...
Question 18: Which threats can a FortiSandbox inspect when it is deployed...
Question 19: Which devices can receive logs from FortiSandbox? (Choose tw...
Question 20: Which FortiADC features can be used to harden the device and...
Question 21: In transparent mode, when choosing between using the built-i...
Question 22: In a server mode config-only cluster, where is the mail data...
Question 23: Which protocols can a FortiSandbox inspect when is deployed ...
Question 24: Which Fortinet Single Sign-on (FSSO) user identity discovery...
Question 25: An administrator wants to implement load balancing persisten...
Question 26: (Exhibit) Based on the exhibit, which are true? (Choose two....
Question 27: Which methods can be used to submit files to FortiSandbox fo...
Question 28: On FortiMail which type of profile is used to configure when...
Question 29: Which statements are true for the EAP-TTLS authentication me...
Question 30: Which FortiGate process sends files to FortiSandbox for insp...
Question 31: Which of these is a security feature specific to FortiADC gl...
Question 32: Which statements are true about the RADIUS service on FortiA...
Question 33: If the corporate email policy dictates that SMTP over SSL/TL...
Question 34: Which behavior does not exist for certificate revocation lis...
Question 35: Which three methods are available to perform backups of the ...
Question 36: Once defined, an antivirus profile can be activated from whi...
Question 37: Which of the following features are available in all FortiAD...
Question 38: Which FortiADC log severity level corresponds to Log Severit...
Question 39: The sender validation techniques SPF and DKIM rely on data p...
Question 40: You want to allow guests to authenticate to your network thr...
Question 41: What mechanism does FortiGate use to avoid sending a file th...
Question 42: Why is it recommended to choose the FortiMail operation mode...
Question 43: Which statements are true about the FortiAuthenticator CLI? ...
Question 44: When FortiMail is operating in server mode, the DNS MX recor...
Question 45: Once an antispam profile has been configured, how is it put ...
Question 46: Which CLI command on FortiAuthenticator is not used for trou...
Question 47: Which protocols are supported for archiving scan job reports...
Question 48: Which of the following statements about layer 2 load balanci...
Question 49: RADIUS authentication with FortiAuthenticator is not working...
Question 50: What information does a scan job report include? (Choose two...
Question 51: If FortiSandbox connects to FortiGuard through a web proxy s...
Question 52: Which of these is an OATH-based standard to generate one-tim...
Question 53: Two FortiADC devices from an HA cluster. What information ca...
Question 54: If the FortiMail administrator wished to identify emails whi...
Question 55: What is one requirement for your network when deploying Fort...
Question 56: If a corporate policy mandates IBE encryption for all outgoi...
Question 57: What is the maximum number of sites (or peers) supported in ...
Question 58: Which configuration object in FortiMail would be used to att...
Question 59: Which two types of digital certificates can you create in Fo...
Question 60: Which of the following statements best describe what a SYN c...