What is the mechanism behind Threat Extraction?
A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
C . This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
D . Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Answer: D
Explanation:
Threat Extraction is a technology that removes potentially malicious features that are known to be risky from files (macros, embedded objects and more), rather than determining their maliciousness. By cleaning the file before it enters the organization, Threat Extraction preemptively prevents both known and unknown threats, providing better protection against zero-day attacks1. Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast2.
The other options are either incorrect or irrelevant to the mechanism behind Threat Extraction.
Reference: Threat Extraction (CDR) – Check Point Software, Check Point Document Threat Extraction Technology
Latest 156-315.81 Dumps Valid Version with 465 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund