A customer does not own Check Point Gateways, but he wants to use Threat Emulation Service to detect
SMTP Zero-Day vulnerabilities. What is his option?
A.
Needs to buy a Check Point security gateway.
B.
Purchase TE cloud service.
C.
Use SMTP plug-in on his exchange server.
D.
Needs to install Mail Transfer Agent on his firewall.