Which statement best describes how a network-based malware protection feature detects a possible event?
- Using virus signature files locally on the firewall, it will detect incorrect MD5 file hashes.
- The firewall applies broad-based application and file control policies to detect malware.
- Malware can be detected correctly by using reputation databases on both the firewall and/or from the cloud.
- IDS signature files that are located on the firewall are used to detect the presence of malware.
- Malware can be detected and stopped by using ACLs and the modular policy framework within the firewall appliance.
Explanation & Hint:
The statement that best describes how a network-based malware protection feature detects a possible event is: “Malware can be detected correctly by using reputation databases on both the firewall and/or from the cloud.” This statement describes a common method for detecting malware that relies on reputation databases, which may be stored locally on a firewall or accessed from the cloud. These databases contain information about known malware signatures, URLs, IP addresses, and other attributes associated with malicious activity. When network traffic is analyzed by the firewall, it can check these attributes against the reputation databases to identify potential malware. The other statements have the following issues:
|