exam questions

Exam 156-215.80 All Questions

View all questions & answers for the 156-215.80 exam

Exam 156-215.80 topic 1 question 336 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 336
Topic #: 1
[All 156-215.80 Questions]

Which of the following describes how Threat Extraction functions?

  • A. Detect threats and provides a detailed report of discovered threats
  • B. Proactively detects threats
  • C. Delivers file with original content
  • D. Delivers PDF versions of original files with active content removed
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nola84
Highly Voted 2 years, 1 month ago
I agree the answer should be D. The description of the feature is "Pro-actively cleans potential threats from incoming documents" It just removes potential threats.
upvoted 11 times
...
djreymix
Most Recent 6 months, 2 weeks ago
definitely D Threat Extraction: -Preemptively removes possible malicious content -Always delivers a file -Works on MS office and PDF files -Delivers PDF version of original file or original format with active content remove -Takes less than a second to complete -Assumes that all active content is potentially malicious -Disables any active functionality in documents regardless of intent.
upvoted 1 times
...
swindonjogger
1 year ago
D is word for word the description on pg626 of the ccse guide for threat extraction. It's D. And this is yet another CCSE question in the CCSA exam question list
upvoted 4 times
...
lcorona76
1 year, 2 months ago
Yes, B is right
upvoted 2 times
...
majster88
1 year, 2 months ago
But D says "Delivers PDF...". So, it can be PDF, but by default it is not. By default it delivers original type of file with removed active content. This is way the correct answer is B
upvoted 3 times
...
Glendel
1 year, 3 months ago
It is B. refer to CCSE book page 626
upvoted 1 times
Knockymow
1 year, 2 months ago
CCSE book page 626 shows a table with "Proactively detects threats" in the Threat Emulation section... so I go with D!
upvoted 3 times
...
...
jm31
1 year, 4 months ago
I'd rather choose D! REF: https://www.checkpoint.com/downloads/product-related/datasheets/DS_Threat_Extraction.pdf under Flexible Protection Option
upvoted 2 times
CSreventon
1 year, 3 months ago
*From CCSE R80 Study Guide Threat Extraction: -Preemptively removes possible malicious content -Always delivers a file -Works on MS office and PDF files -Delivers PDF version of original file or original format with active content remove -Takes less than a second to complete -Assumes that all active content is potentially malicious -Disables any active functionality in documents regardless of intent. Hence D !
upvoted 2 times
...
...
1M4hqQ9G
1 year, 6 months ago
Answer is definitely D
upvoted 1 times
...
ribidibidi
2 years, 1 month ago
B is right https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk114807
upvoted 1 times
...
utt
2 years, 2 months ago
I prefer D is correct, cus Threat Extraction dont detect threat, it just remove link, macro, ...
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago