A is correct from this table on official CCSE R80 guide Pg.331
The following table details the differences between Threat Extraction an d Threat Emulation: Threat Extraction Pre-preemptively remove s possible malicious content Always delivers a file Works on MS Office and PDF files Threat Emulation Pro-actively detects threats Delivers fi le if no threats are detected Works on MS Office, PDF, executables, and archive files Delivers PDF version of original file or original format with active content remove Takes less than a second to complete Assumes that all active content is potentially malicious Disables any active functionality in documents regardless of its intent Delivers file with original content Takes minutes to complete (less than 3 minutes) Detects threats and provides a detailed report of discovered threats Delivers full functionality if no threats are
How is B the answer? That is obvious, but doesn't seem relevant to the idea of Threat Extraction. A is totally the answer - users will always get a file, whether it's the original file, or a scrubbed file, but either way, they get a file of some sort.
Agree with others. Answer A . A safe file stripped out of any code is delivered first. The full version of the file is then delivered to the user if found safe.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
utt
Highly Voted 2 years, 1 month agodguskov
Most Recent 5 months agoCC_prep1
7 months agoamuse311
1 year, 3 months agoNikolas
1 year, 4 months agoSnir
1 year, 5 months agotheManFromRoom5
7 months agoliyanagelnp
1 year, 6 months agoKurp
1 year, 9 months agoguts
2 years ago