ExamGecko
Question list
Search
Search

Question 396 - 156-215.81 discussion

Report
Export

What are the software components used by Autonomous Threat Prevention Profiles in R8I.20 and higher?

A.
Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation
Answers
A.
Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation
B.
IPS, Threat Emulation and Threat Extraction
Answers
B.
IPS, Threat Emulation and Threat Extraction
C.
Sandbox, ThreatCloud, Sanitization, C&C Protection, IPS
Answers
C.
Sandbox, ThreatCloud, Sanitization, C&C Protection, IPS
D.
IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
Answers
D.
IPS, Anti-Bot, Anti-Virus, SandBlast and Macro Extraction
Suggested answer: D

Explanation:

This answer is correct because these are the software components that are used by the pre-defined Autonomous Threat Prevention Profiles in R81.20 and higher1.These profiles provide zero-maintenance protection from zero-day threats and continuously and autonomously ensure that your protection is up-to-date with the latest cyber threats and prevention technologies2.

The other answers are not correct because they either include software components that are not part of the Autonomous Threat Prevention Profiles, such as Sandbox, ThreatCloud, Zero Phishing, Sanitization, C&C Protection, JPS, File and URL Reputation, or they omit some of the software components that are part of the Autonomous Threat Prevention Profiles, such as Anti-Bot, Anti-Virus, and Macro Extraction.

Autonomous Threat Prevention Management - Check Point Software

Check Point Quantum R81.20 (Titan) Release

Threat Prevention R81.20 Best Practices - Check Point Software

Check Point R81

asked 16/09/2024
Aleksandar Jovasevic
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first