Exam 156-215.80 All QuestionsBrowse all questions from this exam
Question 271

Which Threat Tool within SmartConsole provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?

    Correct Answer: B

    The Threat Tool within SmartConsole that provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed is 'Whitelist Files'. This tool is used to manage files that are known to be safe, thereby reducing the need for unnecessary scanning and conserving system resources by excluding these files from Threat Prevention scans.

Discussion
den246Option: B

B is correct, Threat Wiki is an online malware database that can suggest us what we should block on other hand the whitelist is those files we trust and don not want the threat prevention will check

CCSAChallengerOption: B

B obvious

Hernan_MellaOption: B

B is ok https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Using-the-Whitelist.htm#:~:text=Whitelist%20is%20a%20list%20of,resource%20utilization%20on%20the%20gateway.&text=Select%20Threat%20Prevention%20%3E%20Advanced%20%3E%20Whitelist,The%20Whitelist%20Files%20page%20opens.

babochnikOption: B

Using the Whitelist Whitelist is a list of files that are trusted. Check PointThreat Prevention engine does not inspect trusted files for malware, viruses, and bots, which helps decrease resource utilization on the gateway. https://dl3.checkpoint.com/paid/0a/0a9a4722c3031fb380e5a9e4e64d1614/CP_R80.40_ThreatPrevention_AdminGuide.pdf?HashKey=1653488289_3c0008b9edc193d6e4fd2033015d34b6&xtn=.pdf

djreymixOption: B

B is correct. ThreatWiki is a Database... is not a list files https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/SmartConsole-Toolbars-Access-and-Threat-Tools.htm

PolinapOption: B

Whitelist is a list of files that are trusted. Check Point Threat Prevention engine does not inspect trusted files for malware, viruses, and bots, which helps decrease resource utilization on the gateway. https://sc1.checkpoint.com/documents/R80/CP_R80_SmartDashboard_OLH/html_frameset.htm?topic=documents/R80/CP_R80_SmartDashboard_OLH/dk6smDgTdUfgmc_QkMcOVg2

chstOption: B

It's B "so they can specify to the Threat Prevention blade"

Al789789

nope, A is correct. Threat Wiki - A tool to see the entire Malware database. Open it from the Threat Wiki pane in the Threat Prevention tab or from the Check Point website. https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm

Al789789

I'm sorry, correct answer is B. https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ThreatPrevention_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ThreatPrevention_AdminGuide/131103