A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
A.
Impersonation analysis
B.
Dictionary profile with predefined smart identifiers