A.
This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
B.
This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
C.
This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
D.
Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
from CCSE R80 guide:
The SandBlast Threat Extraction engine examines document files and removes any active
contents from the document, while Threat Emulation runs the file in its secured environment. Active contents include objects such as JavaScript, macros, and links, which cyber criminals may use to insert their malicious code.
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nikolas
1 month, 2 weeks ago