Multiple Choice
What is the mechanism behind Threat Extraction?
A) This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
B) This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
C) This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring) .
D) Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.
Correct Answer:

Verified
Correct Answer:
Verified
Q12: VPN Link Selection will perform the following
Q13: You want to gather and analyze threats
Q14: The "fw monitor" tool can be best
Q15: On R80.10 the IPS Blade is managed
Q16: What is the Implicit Clean-up Rule?<br>A) A
Q18: Which of the following is NOT a
Q19: SandBlast appliances can be deployed in the
Q20: Which is NOT an example of a
Q21: Which of the following links will take
Q22: What is the valid range for VRID