At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?
Answer : B
When enabling Threat Emulation on a standard Check Point gateway, which command allows you to offload emulation to multiple private cloud SandBlast appliances?
Answer : D
You analyze your Threat Prevention events in SmartEvent and there is one specific event with a PDF-document you suspect being malicious. What is a typical behavior Threat Emulation would detect as malicious? When the PDF is opened in VM:
Answer : D
Which phase(s) is(are) NOT part of the Cyber Kill Chain?
Answer : C
What are the 3 stages of securing the network with the SandBlast Agent?
Answer : A
With regard to SandBlast licensing options, which is INCORRECT?
Answer : A
Which statements below are CORRECT regarding Threat Prevention profiles in SmartDashboard?
1. You can assign multiple profiles per gateway.
2. A profile can be assigned to one or more rules.
3. Only one profile per gateway is allowed.
4. A profile can be assigned to only one rule.
Answer : C