ExamGecko
Question list
Search
Search

Question 183 - 156-315.81 discussion

Report
Export

Which of the following describes how Threat Extraction functions?

A.
Detect threats and provides a detailed report of discovered threats.
Answers
A.
Detect threats and provides a detailed report of discovered threats.
B.
Proactively detects threats.
Answers
B.
Proactively detects threats.
C.
Delivers file with original content.
Answers
C.
Delivers file with original content.
D.
Delivers PDF versions of original files with active content removed.
Answers
D.
Delivers PDF versions of original files with active content removed.
Suggested answer: D

Explanation:

Threat Extraction is a software blade that delivers PDF versions of original files with active content removed. Active content, such as macros, scripts, or embedded objects, can be used by attackers to deliver malware or exploit vulnerabilities. Threat Extraction removes or sanitizes the active content from the files and converts them to PDF format, which is safer and more compatible. Threat Extraction can also work together with Threat Emulation to provide both clean and original files to the users.

Reference:Check Point Security Expert R81 Course, Threat Extraction Administration Guide

asked 16/09/2024
Akash Makkar
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first