Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 156-315.80 topic 1 question 175 discussion

Actual exam question from Checkpoint's 156-315.80
Question #: 175
Topic #: 1
[All 156-315.80 Questions]

Which of the following describes how Threat Extraction functions?

  • A. Detect threats and provides a detailed report of discovered threats.
  • B. Proactively detects threats.
  • C. Delivers file with original content.
  • D. Delivers PDF versions of original files with active content removed.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ang7
Highly Voted 4 years, 2 months ago
D should be the answer.
upvoted 20 times
...
datastream
Highly Voted 3 years, 9 months ago
"Delivers PDF version of original file or original format with active content remove" = Threat Extraction "Proactively detects threats" = Threat Emulation CCSE R80 manual, page 626
upvoted 11 times
...
lagalack
Most Recent 1 year, 2 months ago
Selected Answer: D
D sounds correct to me.
upvoted 1 times
...
kambata
1 year, 4 months ago
Selected Answer: D
Correct answer: D
upvoted 1 times
...
tosyeno
1 year, 6 months ago
The correct answer is D
upvoted 1 times
...
JNyquist
1 year, 7 months ago
Selected Answer: D
Absolutely D. The question doesn’t specify that PDF would be the ONLY format it can deliver files in. It merely asks for which of the answers is correct, not which is “The truth, the whole truth and nothing but the truth” :-)
upvoted 1 times
...
Amathai1803
2 years, 1 month ago
Had this question today in exam. gave D as the answer
upvoted 2 times
...
dml90
2 years, 2 months ago
Selected Answer: D
It is D
upvoted 1 times
...
lordlich
2 years, 2 months ago
this should be D because Threat Extraction does not rely on detection
upvoted 1 times
...
seralvarCR
2 years, 8 months ago
Key word here is "detect", Threat Extraction does NOT "detect" anything, just removes potential sources of threat, even if is legit, the "detection" portion is done by Threat Emulation. Now, delivering a PDF file is ONE of the possibilities of actions done by Threat Extraction, even though D does not cover ALL options, it is correct
upvoted 3 times
...
nipisar1
2 years, 9 months ago
D is not quite correct. The file can be delivered in PDF or in original format with macros and scripts removed. So B may be correct.
upvoted 1 times
...
matfid
3 years, 1 month ago
correct answer is d as descriped by datastream and truthteller. see table content CSE R80 manual, page 626
upvoted 1 times
...
kambata
3 years, 4 months ago
D of course ...
upvoted 1 times
...
truthteller
3 years, 10 months ago
D is the correct answer, CCSE R80 manual, page 626
upvoted 8 times
...
vhick
4 years, 9 months ago
Correct answer is B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...