You can select the file types that are sent for emulation for all the Threat Prevention profiles. Each profile defines a(n) _____ or ______ action for the file types.
A . Inspect/Bypass
B . Inspect/Prevent
C . Prevent/Bypass
D . Detect/Bypass
Answer: A
Explanation:
Reference: https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/101703.htm