156-315.81: Check Point Certified Security Expert R81
Checkpoint
Exam Number: 156-315.81
Exam Name: Check Point Certified Security Expert R81
Length of test: 120 mins
Exam Format: Multiple-choice questions.
Exam Language: English
Number of questions in the actual exam: 90
Passing Score: around 70-75%
It's recommended to have prior knowledge of Check Point technologies, usually through the CCSA certification or equivalent experience.
This study guide should help you understand what to expect on the 156-315.81 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.
Related questions
True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.
Explanation:
In R81, more than one administrator can login to the Security Management Server with write permission at the same time. This feature is enabled by default and allows concurrent administration of the security policy. Every administrator works in a session that is independent of the other administrators. Changes made by one administrator are not visible to others until they are published. Administrators can also lock objects to prevent others from editing them until they are unlocked.
Reference:R81 Security Management Administration Guide, page 43.
When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:
Explanation:
When Dynamic Dispatcher is enabled, it dynamically assigns connections, but there are exceptions. The exception mentioned in the question is:
VoIP (Option D): VoIP connections are an exception when Dynamic Dispatcher is enabled. They are not assigned dynamically but follow a different rule set to ensure quality and reliability for VoIP traffic.
The other options, Threat Emulation (Option A), HTTPS (Option B), and QoS (Option C), are dynamically assigned when Dynamic Dispatcher is enabled.
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
Explanation:
It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic.
During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.
Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory is true?
When simulating a problem on ClusterXL cluster with cphaprob --d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?
Explanation:
When simulating a problem on a ClusterXL cluster with the command 'cphaprob --d STOP -s problem -t 0 register' to initiate a failover on an active cluster member, you can use the command 'cphaprob --d STOP unregister' to remove the problematic state and return the cluster to normal operation.
Option A correctly identifies the command that allows you to remove the problematic state, making it the verified answer.
What is the command used to activated Multi-Version Cluster mode?
Which TCP port does the CPM process listen on?
Explanation:
The TCP port that the CPM process listens on is 19009. The CPM process is the Check Point Management process that handles all management operations on the Security Management Server, such as policy installation, database synchronization, logging, etc. It communicates with other processes and clients using TCP port 19009. The other ports are used by different processes or services. TCP port 18191 is used by the FWM process for management communication. TCP port 18190 is used by the CPD process for inter-process communication. TCP port 8983 is used by the Solr process for SmartLog indexing.
Reference: [Check Point Ports]
By default, the R81 web API uses which content-type in its response?
Explanation:
By default, the R81 web API uses JSON as the content-type in its response. JSON stands for JavaScript Object Notation and is a lightweight data-interchange format that is easy to read and write. XML, Java Script, and Text are not the default content-types for the R81 web API.
Reference: : Check Point Software, Getting Started, Web API; : JSON.org, Introducing JSON.
The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?
Explanation:
The API commandadd host name <New HostName> ip-address <ip address>can be used in a script to create 100 new host objects with different IP addresses. This command adds a new host object with the specified name and IP address to the database. The other commands are either not valid or not suitable for creating new host objects.
Reference: Check Point - Management API reference
You have existing dbedit scripts from R77. Can you use them with R81.20?
Explanation:
In R81.20, dbedit scripts are being replaced by the mgmt_cli utility for managing and configuring security policies and objects. Here's an explanation of each option:
A) dbedit is not supported in R81.20: This is not entirely accurate. While dbedit is still available and functional in R81.20, it is being phased out in favor of mgmt_cli for policy and object management.
B) dbedit is fully supported in R81.20: This statement is not accurate because although dbedit can still be used, it is not the primary recommended tool for policy management in R81.20.
C) You can use dbedit to modify threat prevention or access policies, but not create or modify layers: This statement is partially true, but it does not provide the complete picture. You can use dbedit for some policy-related tasks, but it's not the primary tool for policy management in R81.20.
D) dbedit scripts are being replaced by mgmt_cli in R81.20: This is the correct and recommended approach. mgmt_cli is the primary tool for managing security policies and objects in R81.20, and it is gradually replacing dbedit for these tasks.
Therefore, option D is the most accurate and recommended answer.
Question