exam questions

Exam 156-315.80 All Questions

View all questions & answers for the 156-315.80 exam

Exam 156-315.80 topic 1 question 45 discussion

Actual exam question from Checkpoint's 156-315.80
Question #: 45
Topic #: 1
[All 156-315.80 Questions]

What is the mechanism behind Threat Extraction?

  • A. This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
  • B. This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
  • C. This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
  • D. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nikolas
1 month, 2 weeks ago
from CCSE R80 guide: The SandBlast Threat Extraction engine examines document files and removes any active contents from the document, while Threat Emulation runs the file in its secured environment. Active contents include objects such as JavaScript, macros, and links, which cyber criminals may use to insert their malicious code.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago