What is the mechanism behind Threat Extraction?
A) This is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender
B) This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient
C) This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring) .
D) Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast
Correct Answer:
Verified
Q141: To fully enable Dynamic Dispatcher on a
Q142: What component of R80 Management is used
Q143: During the Check Point Stateful Inspection Process,
Q144: The Firewall kernel is replicated multiple times,
Q145: In SmartEvent, what are the different types
Q147: Which of these statements describes the Check
Q148: If the first packet of an UDP
Q149: Which limitation of CoreXL is overcome by
Q150: The WebUI offers three methods for downloading
Q151: What are types of Check Point APIs
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents