Which Threat Prevention profile uses sanitization technology?
Which Threat Prevention profile uses sanitization technology?
Sanitization technology is used in perimeter threat prevention profiles. This profile focuses on inspecting and sanitizing content to prevent malicious threats from entering the network perimeter.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization
Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile
CCSA R81.10 Page 640 - "Table shows the technologies used by each profile" Sanitization is Enable in "Perimeter" and "Strict Security"
B. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization
I would answer C. "Sandboxing works by keeping potentially malicious program or unsafe code isolated from the rest of the organization’s environment. This way, it can be analyzed safely, without compromising your operating system or host devices. If a threat is detected, it can be removed proactively." Checkpoint does use Sandboxing technology, called "SandBlast Threat Emulation Sandboxing" https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-sandboxing/
only perimeter and stric profile use sanitization. answer correct is perimeter