An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.
Which FortiMail feature specific to server mode can be used to accomplish this?
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
Refer to the exhibit which shows the Authentication Reputation list on a gateway mode FortiMail device.
Why was the IP address blocked?
Refer to the exhibit, which shows a topology diagram of two separate email domains.
Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)