ExamGecko
Question list
Search
Search

Question 70 - 156-315.81 discussion

Report
Export

What is the mechanism behind Threat Extraction?

A.
This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
Answers
A.
This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
B.
This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
Answers
B.
This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
C.
This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
Answers
C.
This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
D.
Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Answers
D.
Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Suggested answer: D

Explanation:

Threat Extraction is a technology that removes potentially malicious features that are known to be risky from files (macros, embedded objects and more), rather than determining their maliciousness.By cleaning the file before it enters the organization, Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks1.Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast2. The other options are either incorrect or irrelevant to the mechanism behind Threat Extraction.

Reference:Threat Extraction (CDR) - Check Point Software,Check Point Document Threat Extraction Technology

asked 16/09/2024
Danilo Omaljev
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first