Posted by: Pdfprep
Post Date: December 3, 2020
Which statement best describes how a network-based malware protection feature detects a possible event?
A . Using virus signature files locally on the firewall, it will detect incorrect MD5 file hashes.
B . The firewall applies broad-based application and file control policies to detect malware.
C . Malware can be detected correctly by using reputation databases on both the firewall and/or from the cloud.
D . IDS signature files that are located on the firewall are used to detect the presence of malware.
E . Malware can be detected and stopped by using ACLs and the modular policy framework within the firewall appliance.
Answer: B
Leave a Reply