ExamGecko
Question list
Search
Search

Question 372 - 156-315.81 discussion

Report
Export

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.

Which component of SandBlast protection is her company using on a Gateway?

A.
SandBlast Threat Emulation
Answers
A.
SandBlast Threat Emulation
B.
SandBlast Agent
Answers
B.
SandBlast Agent
C.
Check Point Protect
Answers
C.
Check Point Protect
D.
SandBlast Threat Extraction
Answers
D.
SandBlast Threat Extraction
Suggested answer: D

Explanation:

Vanessa is expecting a very important Security Report. The Document should be sent as an attachment via e-mail. An e-mail with Security_report.pdf file was delivered to her e-mail inbox. When she opened the PDF file, she noticed that the file is basically empty and only few lines of text are in it. The report is missing some graphs, tables and links.

The component of SandBlast protection that her company is using on a Gateway isSandBlast Threat Extraction. SandBlast Threat Extraction is a software blade that provides protection against malicious files by removing potentially risky elements, such as macros, embedded objects, scripts, etc. The sanitized files are delivered to the users with a notification about the removed elements. SandBlast Threat Extraction can also reconstruct the original files after they are scanned by SandBlast Threat Emulation, which is another software blade that provides protection against malicious files by emulating them in a virtual sandbox and analyzing their behavior.

Reference:R81 Threat Prevention Administration Guide, page 37.

asked 16/09/2024
Ntombifuthi Shabangu
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first