B.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization
I would answer C.
"Sandboxing works by keeping potentially malicious program or unsafe code isolated from the rest of the organization’s environment. This way, it can be analyzed safely, without compromising your operating system or host devices. If a threat is detected, it can be removed proactively."
Checkpoint does use Sandboxing technology, called "SandBlast Threat Emulation Sandboxing"
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-sandboxing/
only perimeter and stric profile use sanitization. answer correct is perimeter
upvoted 3 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
colinshe
Highly Voted 2 years agoAeliton
Most Recent 1 year, 5 months agoyuop
1 year, 11 months agotosyeno
2 years agoMcBeano
2 years, 1 month agodavid13121991
2 years ago