B.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization
I would answer C.
"Sandboxing works by keeping potentially malicious program or unsafe code isolated from the rest of the organization’s environment. This way, it can be analyzed safely, without compromising your operating system or host devices. If a threat is detected, it can be removed proactively."
Checkpoint does use Sandboxing technology, called "SandBlast Threat Emulation Sandboxing"
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-sandboxing/
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
colinshe
Highly Voted 12 months agoAeliton
Most Recent 4 months, 3 weeks agoyuop
10 months, 4 weeks agotosyeno
1 year agoMcBeano
1 year agodavid13121991
1 year ago