Which Check Point software blade prevents malicious files from entering a network using virus signatures and
anomaly-based protections from ThreatCloud?
A.
Firewall
B.
Application Control
C.
Anti-spam and Email Security
D.
Antivirus
Explanation:
The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and
anomaly-based protections from ThreatCloud™, the first collaborative network to fight cybercrime, to detect
and block malware at the gateway before users are affected.
https://www.checkpoint.com/products/antivirus-software-blade/