Which of the following describes how Threat Extraction functions?

Which of the following describes how Threat Extraction functions?
A. Detect threats and provides a detailed report of discovered threats.
B. Proactively detects threats.
C. Delivers file with original content.
D. Delivers PDF versions of original files with active content removed.

Download Printable PDF. VALID exam to help you PASS.

4 thoughts on “Which of the following describes how Threat Extraction functions?

  1. A few important points on Threat Extraction:
    This technology offers two modes of operation:
    ‘Clean’ delivers files in their original formats while removing active content such as scripts. For instance, a PowerPoint presentation will be delivered as a PowerPoint presentation.
    ‘Convert’ transforms files into PDF – it’s a more aggressive transformation, and though the user experience is not as smooth as with Clean mode, virtually no malware can survive this transformation.
    So you have a the classic tradeoff here between security and user-experience

    Answer D is correct

  2. I know this one is the annoying one, but D is correct (insert from the official Study guide):

    Threat Extraction:
    Preemptively removes possible malicious content
    Always delivers a file
    Works on MS office and PDF files
    Delivers PDF version of original file or original format with active content remove
    Takes less than a second to complete
    Assumes that all active content is potentially malicious
    Disables any active functionality in documents regardless of intent.

    With all of this I think it’s pretty safe to assume D is correct answer.

  3. D is correct, for me. Don’t think that Threat Extraction detects anything, it just removing active content.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.