What is the mechani...
 
Notifications
Clear all

What is the mechanism behind Threat Extraction?

1 Posts
1 Users
0 Likes
140 Views
 Chi
(@jamiesonchi)
Noble Member
Joined: 2 years ago
Posts: 727
Topic starter  

What is the mechanism behind Threat Extraction?

  • A . This is a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender
  • B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient
  • C . This is a new mechanism to identify the IP address of the sender of malicious codes and to put it into the SAM database (Suspicious Activity Monitoring).
  • D . Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast

Show Answer Hide Answer

Suggested Answer: D

   
Quote
Topic Tags

Latest Check Point 156-215.81 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: