exam questions

Exam 156-315.81 All Questions

View all questions & answers for the 156-315.81 exam

Exam 156-315.81 topic 1 question 274 discussion

Actual exam question from Checkpoint's 156-315.81
Question #: 274
Topic #: 1
[All 156-315.81 Questions]

Return oriented programming (ROP) exploits are detected by which security blade?

  • A. Data Loss Prevention
  • B. Check Point Anti-Virus / Threat Emulation
  • C. Application control
  • D. Intrusion Prevention Software
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
Community vote distribution
B (67%)
A (33%)

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Keerberus
7 months, 1 week ago
Selected Answer: B
SandBlast Threat Emulation Sandboxing CPU-level inspection makes SandBlast even more attractive. It prevents exploits like Return-Oriented Programming attacks, and the sandboxing process is fast. The speed, simplicity, and ease of use mean a lot to us. so the answer is A: Check Point Threat Emulation
upvoted 2 times
Keerberus
7 months, 1 week ago
Sorry, writing error at the end: "so the answer is B: Check Point Threat Emulation"
upvoted 3 times
...
...
Shahrouz
7 months, 3 weeks ago
Selected Answer: A
“CPU-level inspection makes SandBlast even more attractive. It prevents exploits like Return-Oriented Programming attacks, and the sandboxing process is fast. Speed, simplicity, and ease of use mean a lot to us.”
upvoted 1 times
Shahrouz
7 months, 2 weeks ago
ups! my mistake. Answer is B
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
AZ-400
Houston, 1 minute ago