You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or _____ action for the file types.
A . Inspect/Bypass
B . Inspect/Prevent
C . Prevent/Bypass
D . Detect/Bypass

Answer: A

Explanation:

You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines an Inspect or Bypass action for the file types. The Inspect action means that the file will be sent to the Threat Emulation engine for analysis, and the Bypass action means that the file will not be sent and will be allowed or blocked based on other Threat Prevention blades1. The other options are not valid actions for file types in Threat Prevention profiles.

Reference: Check Point R81 Threat Prevention Administration Guide

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments