Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.)
Examine the access receive rule shown in the exhibit; then answer the question below.
Which of the following statements are true? (Choose two.)
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)