Which of the following describes how Threat Extraction functions?
Which of the following describes how Threat Extraction functions?
Threat Extraction works by removing potentially harmful content from files and delivering a cleaned version. While it doesn't proactively detect threats or report on them in detail, it ensures that any active content that could be harmful is eliminated. This often involves converting files, such as making a PDF version with all active content removed to ensure safety. Therefore, the correct description of how Threat Extraction functions is delivering PDF versions of original files with active content removed.
D should be the answer.
"Delivers PDF version of original file or original format with active content remove" = Threat Extraction "Proactively detects threats" = Threat Emulation CCSE R80 manual, page 626
D is the correct answer, CCSE R80 manual, page 626
Key word here is "detect", Threat Extraction does NOT "detect" anything, just removes potential sources of threat, even if is legit, the "detection" portion is done by Threat Emulation. Now, delivering a PDF file is ONE of the possibilities of actions done by Threat Extraction, even though D does not cover ALL options, it is correct
Had this question today in exam. gave D as the answer
D sounds correct to me.
Correct answer: D
The correct answer is D
Absolutely D. The question doesn’t specify that PDF would be the ONLY format it can deliver files in. It merely asks for which of the answers is correct, not which is “The truth, the whole truth and nothing but the truth” :-)
It is D
this should be D because Threat Extraction does not rely on detection
D is not quite correct. The file can be delivered in PDF or in original format with macros and scripts removed. So B may be correct.
correct answer is d as descriped by datastream and truthteller. see table content CSE R80 manual, page 626
D of course ...
Correct answer is B