A customer does not own Check Point Gateways, but he wants to use Threat Emulation Service to detect SMTP Zero-Day vulnerabilities. What is his option?
A. Needs to buy a Check Point security gateway.
B. Purchase TE cloud service.
C. Use SMTP plug-in on his exchange server,
D. Needs to install Mail Transfer Agent on his firewall.