Which statement best describes how a network-based malware protection feature detects a possible event?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which statement best describes how a network-based malware protection feature detects a possible event?
A . Using virus signature files locally on the firewall, it will detect incorrect MD5 file hashes.
B . The firewall applies broad-based application and file control policies to detect malware.
C . Malware can be detected correctly by using reputation databases on both the firewall and/or from the cloud.
D . IDS signature files that are located on the firewall are used to detect the presence of malware.
E . Malware can be detected and stopped by using ACLs and the modular policy framework within the firewall appliance.

Answer: B

Leave a Reply

Your email address will not be published.