Exam 156-21581 All QuestionsBrowse all questions from this exam
Question 65

Which Threat Prevention profile uses sanitization technology?

    Correct Answer: B

    Sanitization technology is used in perimeter threat prevention profiles. This profile focuses on inspecting and sanitizing content to prevent malicious threats from entering the network perimeter.

Discussion
colinsheOption: B

https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization

tosyenoOption: B

Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile

AelitonOption: B

CCSA R81.10 Page 640 - "Table shows the technologies used by each profile" Sanitization is Enable in "Perimeter" and "Strict Security"

yuopOption: B

B. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Infinity_Threat_Prevention_Profiles.htm?Highlight=sanitization

McBeanoOption: C

I would answer C. "Sandboxing works by keeping potentially malicious program or unsafe code isolated from the rest of the organization’s environment. This way, it can be analyzed safely, without compromising your operating system or host devices. If a threat is detected, it can be removed proactively." Checkpoint does use Sandboxing technology, called "SandBlast Threat Emulation Sandboxing" https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-sandboxing/

david13121991

only perimeter and stric profile use sanitization. answer correct is perimeter