Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 156-215.80 topic 1 question 474 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 474
Topic #: 1
[All 156-215.80 Questions]

The ______ software blade package uses CPU-level and OS-level sandboxing in order to detect and block malware.

  • A. Next Generation Threat Prevention
  • B. Next Generation Threat Emulation
  • C. Next Generation Threat Extraction
  • D. Next Generation Firewall
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lucacin
Highly Voted 2 years, 11 months ago
Correct answer is B! Threat Emulation (Sandboxing) Preventing today’s sophisticated attacks requires innovation. As part of the Check Point SandBlast Zero-Day Protection solution, the Threat Emulation engine picks up malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.
upvoted 10 times
...
Bobyly
Most Recent 2 years, 2 months ago
ANS: B SandBlast Threat Emulation The Threat Emulation engine is the sandbox component of SandBlast. It protects the network against advanced and zero-day attacks by performing both CPU-level and OS-level inspection of files. Threat Emulation hosts the file in a sandbox environment and examines it on a CPUlevel for any indication of exploit activity. This inspection stops the file from executing any of its routines, particularly those that attempt to evade detection.
upvoted 4 times
...
Kenetic
2 years, 7 months ago
Next Generation Threat Extraction ” The new face of malware is fast and stealthy thanks to obfuscation tools that help attacks slip past the most sophisticated anti-malware solutions. The Check Point Next Generation Th reat Extraction (NGTX) Software Blade package combines the NGTP package set with CPU-level and operating system-level sandbox capabilities to detect and block malware. While the file is run in a sandbox, Threat Extraction reconstructs incoming documents to deliver zero malware documents in zero seconds. The package includes all NGTP Software Blades plus the Threat Extraction service. “
upvoted 1 times
...
mauchi
3 years, 2 months ago
It's asking about Software Blade PACKAGES, not just the blade, thats the catch
upvoted 1 times
Hernan_Mella
1 year, 9 months ago
Yes i think that the blade is T.EMUL, but the package is T.EXT
upvoted 1 times
...
...
babajana
3 years, 5 months ago
correct is C
upvoted 1 times
...
DrTee
3 years, 8 months ago
Threat Emulation is OS and CPU level, however it is only offered in the NGTX(Extraction)package not in Prevention package, Answer C in this case
upvoted 4 times
...
eww_cybr
3 years, 9 months ago
https://www.checkpoint.com/products/threat-emulation-sandboxing/ Identify more malware Check Point SandBlast Zero-Day Protection conducts further investigation with OS-level sandboxing by intercepting and filtering inbound files and inspecting URLs linked to files within emails by running them in a virtual environment. Unlike other solutions, Check Point zero-day threat sandboxing uses a unique technology. Conducting inspection at the CPU-level to stop attacks before they have a chance to launch. There are thousands of vulnerabilities and millions of malware implementations, but very few methods that cybercriminals utilize to exploit vulnerabilities. The Check Point SandBlast Threat Emulation engine monitors CPU-based instruction flow for exploits attempting to bypass OS security controls.
upvoted 1 times
...
Levis
3 years, 10 months ago
B lookslike the answer
upvoted 1 times
...
Besnik
3 years, 11 months ago
C 100% Page 443
upvoted 3 times
Besnik
3 years, 11 months ago
Ans:C Page 443 material Next Generation Threat Extraction Software Blade package combines the NGTP package set with CPU-level and operating system-level sandbox capabilities to detect and block malware.(NGTP*Threat Extraction service)
upvoted 10 times
Hernan_Mella
1 year, 10 months ago
Its says clear: TExt combines NGTP [means abot, av, IPS etc] and CPULvl ans OS Sandbox[means NGTX/SNBT]. It means CPULvl and OS Sandbox are capabilities of others blades
upvoted 1 times
...
...
Skillplayer
1 year, 9 months ago
No answer is B
upvoted 1 times
...
...
C4rlos
4 years ago
5 Check Point all-inlusive software blade package solutions: - Next generation firewall - Next generation Threat Prevention - Next generation Threat extraction - Next generation data protection - Secure web gateway Next generation threat emulation is not listed there. In fact, you cant find software blade with such name on Check point website. My answer would be A
upvoted 4 times
Kurp
3 years, 12 months ago
Answer is threat Emulation. Open your security gateway properties, under network security blades, under sandblast you have two blades Threat Emulation and Threat Extraction.
upvoted 1 times
C4rlos
3 years, 12 months ago
I think you are mixing oil and water, "Next generation" is the catch in the question IMHO
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...