Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 156-215.80 topic 1 question 282 discussion

Actual exam question from Checkpoint's 156-215.80
Question #: 282
Topic #: 1
[All 156-215.80 Questions]

Which one of the following is true about Threat Extraction?

  • A. Always delivers a file to user
  • B. Works on all MS Office, Executables, and PDF files
  • C. Can take up to 3 minutes to complete
  • D. Delivers file only if no threats found
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
utt
Highly Voted 4 years, 4 months ago
A with no doubt
upvoted 13 times
...
dguskov
Most Recent 2 years, 8 months ago
there is fo executable files: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk101553
upvoted 1 times
...
CC_prep1
2 years, 10 months ago
A is correct from this table on official CCSE R80 guide Pg.331 The following table details the differences between Threat Extraction an d Threat Emulation: Threat Extraction Pre-preemptively remove s possible malicious content Always delivers a file Works on MS Office and PDF files Threat Emulation Pro-actively detects threats Delivers fi le if no threats are detected Works on MS Office, PDF, executables, and archive files Delivers PDF version of original file or original format with active content remove Takes less than a second to complete Assumes that all active content is potentially malicious Disables any active functionality in documents regardless of its intent Delivers file with original content Takes minutes to complete (less than 3 minutes) Detects threats and provides a detailed report of discovered threats Delivers full functionality if no threats are
upvoted 3 times
...
amuse311
3 years, 7 months ago
How is B the answer? That is obvious, but doesn't seem relevant to the idea of Threat Extraction. A is totally the answer - users will always get a file, whether it's the original file, or a scrubbed file, but either way, they get a file of some sort.
upvoted 3 times
...
Nikolas
3 years, 7 months ago
answer is A, from CCSE R80 guide page 626
upvoted 4 times
...
Snir
3 years, 8 months ago
Sorry, but I think D is the answer. Can't be B, B is for Threat Emulation
upvoted 1 times
theManFromRoom5
2 years, 10 months ago
All is forgiven, answer is definitely A
upvoted 1 times
...
...
liyanagelnp
3 years, 9 months ago
https://www.checkpoint.com/products/threat-extraction/
upvoted 1 times
...
Kurp
4 years ago
Agree with others. Answer A . A safe file stripped out of any code is delivered first. The full version of the file is then delivered to the user if found safe.
upvoted 1 times
...
guts
4 years, 3 months ago
agree, A
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...