Which of the following describes how Threat Extraction functions?

Which of the following describes how Threat Extraction functions?
A . Detect threats and provides a detailed report of discovered threats
B . Proactively detects threats
C . Delivers file with original content
D . Delivers PDF versions of original files with active content removed

Answer: D

Explanation:

Threat Extraction delivers PDF versions of original files with active content removed, such as macros, embedded objects, and scripts. This ensures that users receive clean and safe files in seconds12.

Reference: Check Point SandBlast Zero-Day Protection, Check Point Threat Extraction

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments