Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)
Currently there are no comments in this discussion, be the first to comment!