Exam 156-585 All QuestionsBrowse all questions from this exam
Question 44

Which of the following daemons is used for Threat Extraction?

    Correct Answer: C

    The daemon used for Threat Extraction is commonly referred to as 'tex'. Threat Extraction, often abbreviated as 'tex', is a security mechanism that removes potentially harmful elements from files to ensure they are safe before they reach the end-user. Therefore, 'tex' is the correct answer.

Discussion
nmrouterOption: A

Correct answer is A. https://support.checkpoint.com/results/sk/sk114807