ExamGecko

156-315.81: Check Point Certified Security Expert R81

Check Point Certified Security Expert R81
Vendor:

Checkpoint

Check Point Certified Security Expert R81 Exam Questions: 626
Check Point Certified Security Expert R81   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

Exam Number: 156-315.81

Exam Name: Check Point Certified Security Expert R81

Length of test: 120 mins

Exam Format: Multiple-choice questions.

Exam Language: English

Number of questions in the actual exam: 90

Passing Score: around 70-75%

It's recommended to have prior knowledge of Check Point technologies, usually through the CCSA certification or equivalent experience.

This study guide should help you understand what to expect on the 156-315.81 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

True or False: In R81, more than one administrator can login to the Security Management Server with write permission at the same time.

A.
False, this feature has to be enabled in the Global Properties.
A.
False, this feature has to be enabled in the Global Properties.
Answers
B.
True, every administrator works in a session that is independent of the other administrators.
B.
True, every administrator works in a session that is independent of the other administrators.
Answers
C.
True, every administrator works on a different database that is independent of the other administrators.
C.
True, every administrator works on a different database that is independent of the other administrators.
Answers
D.
False, only one administrator can login with write permission.
D.
False, only one administrator can login with write permission.
Answers
Suggested answer: B

Explanation:

In R81, more than one administrator can login to the Security Management Server with write permission at the same time. This feature is enabled by default and allows concurrent administration of the security policy. Every administrator works in a session that is independent of the other administrators. Changes made by one administrator are not visible to others until they are published. Administrators can also lock objects to prevent others from editing them until they are unlocked.

Reference:R81 Security Management Administration Guide, page 43.

asked 16/09/2024
Louis Perriot
42 questions

When Dynamic Dispatcher is enabled, connections are assigned dynamically with the exception of:

A.
Threat Emulation
A.
Threat Emulation
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
QOS
C.
QOS
Answers
D.
VoIP
D.
VoIP
Answers
Suggested answer: D

Explanation:

When Dynamic Dispatcher is enabled, it dynamically assigns connections, but there are exceptions. The exception mentioned in the question is:

VoIP (Option D): VoIP connections are an exception when Dynamic Dispatcher is enabled. They are not assigned dynamically but follow a different rule set to ensure quality and reliability for VoIP traffic.

The other options, Threat Emulation (Option A), HTTPS (Option B), and QoS (Option C), are dynamically assigned when Dynamic Dispatcher is enabled.

asked 16/09/2024
Shane Behrendt
35 questions

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

A.
It will generate Geo-Protection traffic
A.
It will generate Geo-Protection traffic
Answers
B.
Automatically uploads debugging logs to Check Point Support Center
B.
Automatically uploads debugging logs to Check Point Support Center
Answers
C.
It will not block malicious traffic
C.
It will not block malicious traffic
Answers
D.
Bypass licenses requirement for Geo-Protection control
D.
Bypass licenses requirement for Geo-Protection control
Answers
Suggested answer: C

Explanation:

It is recommended to enable Detect-Only for Troubleshooting on the profile during the initial installation of IPS. This option overrides any protections that are set to Prevent so that they will not block any traffic.

During this time you can analyze the alerts that IPS generates to see how IPS will handle network traffic, while avoiding any impact on the flow of traffic.

asked 16/09/2024
Fabio Morais Melo
37 questions

Secure Configuration Verification (SCV), makes sure that remote access client computers are configured in accordance with the enterprise Security Policy. Bob was asked by Alice to implement a specific SCV configuration but therefore Bob needs to edit and configure a specific Check Point file. Which location file and directory is true?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

When simulating a problem on ClusterXL cluster with cphaprob --d STOP -s problem -t 0 register, to initiate a failover on an active cluster member, what command allows you remove the problematic state?

A.
cphaprob --d STOP unregister
A.
cphaprob --d STOP unregister
Answers
B.
cphaprob STOP unregister
B.
cphaprob STOP unregister
Answers
C.
cphaprob unregister STOP
C.
cphaprob unregister STOP
Answers
D.
cphaprob --d unregister STOP
D.
cphaprob --d unregister STOP
Answers
Suggested answer: A

Explanation:

When simulating a problem on a ClusterXL cluster with the command 'cphaprob --d STOP -s problem -t 0 register' to initiate a failover on an active cluster member, you can use the command 'cphaprob --d STOP unregister' to remove the problematic state and return the cluster to normal operation.

Option A correctly identifies the command that allows you to remove the problematic state, making it the verified answer.

asked 16/09/2024
Bartosz Szewczyk
37 questions

What is the command used to activated Multi-Version Cluster mode?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Which TCP port does the CPM process listen on?

A.
18191
A.
18191
Answers
B.
18190
B.
18190
Answers
C.
8983
C.
8983
Answers
D.
19009
D.
19009
Answers
Suggested answer: D

Explanation:

The TCP port that the CPM process listens on is 19009. The CPM process is the Check Point Management process that handles all management operations on the Security Management Server, such as policy installation, database synchronization, logging, etc. It communicates with other processes and clients using TCP port 19009. The other ports are used by different processes or services. TCP port 18191 is used by the FWM process for management communication. TCP port 18190 is used by the CPD process for inter-process communication. TCP port 8983 is used by the Solr process for SmartLog indexing.

Reference: [Check Point Ports]

asked 16/09/2024
Madhankumar Rathinakumar
35 questions

By default, the R81 web API uses which content-type in its response?

A.
Java Script
A.
Java Script
Answers
B.
XML
B.
XML
Answers
C.
Text
C.
Text
Answers
D.
JSON
D.
JSON
Answers
Suggested answer: D

Explanation:

By default, the R81 web API uses JSON as the content-type in its response. JSON stands for JavaScript Object Notation and is a lightweight data-interchange format that is easy to read and write. XML, Java Script, and Text are not the default content-types for the R81 web API.

Reference: : Check Point Software, Getting Started, Web API; : JSON.org, Introducing JSON.

asked 16/09/2024
Tym Dom
41 questions

The Firewall Administrator is required to create 100 new host objects with different IP addresses. What API command can he use in the script to achieve the requirement?

A.
add host name <New HostName> ip-address <ip address>
A.
add host name <New HostName> ip-address <ip address>
Answers
B.
add hostname <New HostName> ip-address <ip address>
B.
add hostname <New HostName> ip-address <ip address>
Answers
C.
set host name <New HostName> ip-address <ip address>
C.
set host name <New HostName> ip-address <ip address>
Answers
D.
set hostname <New HostName> ip-address <ip address>
D.
set hostname <New HostName> ip-address <ip address>
Answers
Suggested answer: A

Explanation:

The API commandadd host name <New HostName> ip-address <ip address>can be used in a script to create 100 new host objects with different IP addresses. This command adds a new host object with the specified name and IP address to the database. The other commands are either not valid or not suitable for creating new host objects.

Reference: Check Point - Management API reference

asked 16/09/2024
Maria Lockhart
27 questions

You have existing dbedit scripts from R77. Can you use them with R81.20?

A.
dbedit is not supported in R81.20
A.
dbedit is not supported in R81.20
Answers
B.
dbedit is fully supported in R81.20
B.
dbedit is fully supported in R81.20
Answers
C.
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
C.
You can use dbedit to modify threat prevention or access policies, but not create or modify layers
Answers
D.
dbedit scripts are being replaced by mgmt_cli in R81.20
D.
dbedit scripts are being replaced by mgmt_cli in R81.20
Answers
Suggested answer: D

Explanation:

In R81.20, dbedit scripts are being replaced by the mgmt_cli utility for managing and configuring security policies and objects. Here's an explanation of each option:

A) dbedit is not supported in R81.20: This is not entirely accurate. While dbedit is still available and functional in R81.20, it is being phased out in favor of mgmt_cli for policy and object management.

B) dbedit is fully supported in R81.20: This statement is not accurate because although dbedit can still be used, it is not the primary recommended tool for policy management in R81.20.

C) You can use dbedit to modify threat prevention or access policies, but not create or modify layers: This statement is partially true, but it does not provide the complete picture. You can use dbedit for some policy-related tasks, but it's not the primary tool for policy management in R81.20.

D) dbedit scripts are being replaced by mgmt_cli in R81.20: This is the correct and recommended approach. mgmt_cli is the primary tool for managing security policies and objects in R81.20, and it is gradually replacing dbedit for these tasks.

Therefore, option D is the most accurate and recommended answer.

asked 16/09/2024
Ramesh Kumar Patel
32 questions