Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

156-315.81 Checkpoint Check Point Certified Security Expert R81.20 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Checkpoint 156-315.81 Check Point Certified Security Expert R81.20 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 7
Total 628 questions

True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway.

A.

True, CLI is the prefer method for Licensing

B.

False, Central License are handled via Security Management Server

C.

False, Central Licenses are installed via Gaia on Security Gateways

D.

True, Central License can be installed with CPLIC command on a Security Gateway

An established connection is going to www.google.com. The Application Control Blade Is inspecting the traffic. If SecureXL and CoreXL are both enabled, which path is handling the traffic?

A.

Slow Path

B.

Fast Path

C.

Medium Path

D.

Accelerated Path

You plan to automate creating new objects using new R81 Management API. You decide to use GAIA CLI for this task.

What is the first step to run management API commands on GAIA’s shell?

A.

mgmt_admin@teabag > id.txt

B.

mgmt_login

C.

login user admin password teabag

D.

mgmt_cli login user “admin” password “teabag” > id.txt

What should the admin do in case the Primary Management Server is temporary down?

A.

Use the VIP in SmartConsole you always reach the active Management Server.

B.

The Secondary will take over automatically Change the IP in SmartConsole to logon to the private IP of the Secondary Management Server.

C.

Run the 'promote_util' to activate the Secondary Management server

D.

Logon with SmartConsole to the Secondary Management Server and choose "Make Active' under Actions in the HA Management Menu

The back-end database for Check Point R81 Management uses:

A.

DBMS

B.

MongoDB

C.

PostgreSQL

D.

MySQL

DLP and Geo Policy are examples of what type of Policy?

A.

Standard Policies

B.

Shared Policies

C.

Inspection Policies

D.

Unified Policies

What is the recommended way to have a redundant Sync connection between the cluster nodes?

A.

In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Connect both Sync interfaces

without using a switch.

B.

Use a group of bonded interfaces. In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define a Virtual IP for the Sync

interface.

C.

In the SmartConsole / Gateways & Servers -> select Cluster Properties / Network Management and define two Sync interfaces per node. Use two different Switches to

connect both Sync interfaces.

D.

Use a group of bonded interfaces connected to different switches. Define a dedicated sync interface, only one interface per node using the SmartConsole / Gateways &

Servers -> select Cluster Properties / Network Management.

In the R81 SmartConsole, on which tab are Permissions and Administrators defined?

A.

Security Policies

B.

Logs and Monitor

C.

Manage and Settings

D.

Gateways and Servers

Alice works for a big security outsourcing provider company and as she receives a lot of change requests per day she wants to use for scripting daily (asks the API services from Check Point fof the Management API. Firstly she needs to be aware if the API services are running for the management. Which of the following Check Point Command is true:

A.

api mgmt status

B.

api status

C.

status api

D.

status mgmt apt

The “MAC magic” value must be modified under the following condition:

A.

There is more than one cluster connected to the same VLAN

B.

A firewall cluster is configured to use Multicast for CCP traffic

C.

There are more than two members in a firewall cluster

D.

A firewall cluster is configured to use Broadcast for CCP traffic

Check Point ClusterXL Active/Active deployment is used when:

A.

Only when there is Multicast solution set up.

B.

There is Load Sharing solution set up.

C.

Only when there is Unicast solution set up.

D.

There is High Availability solution set up.

Which Check Point daemon invokes and monitors critical processes and attempts to restart them if they fail?

A.

fwm

B.

cpd

C.

cpwd

D.

cpm

By default, which port does the WebUI listen on?

A.

80

B.

4434

C.

443

D.

8080

Choose the correct syntax to add a new host named “emailserver1” with IP address 10.50.23.90 using GAiA Management CLI?

A.

mgmt_cli add host name “myHost12 ip” address 10.50.23.90

B.

mgmt_cli add host name ip-address 10.50.23.90

C.

mgmt_cli add host “emailserver1” address 10.50.23.90

D.

mgmt_cli add host name “emailserver1” ip-address 10.50.23.90

You have enabled “Full Log” as a tracking option to a security rule. However, you are still not seeing any data type information. What is the MOST likely reason?

A.

Logging has disk space issues. Change logging storage options on the logging server or Security Management Server properties and install database.

B.

Data Awareness is not enabled.

C.

Identity Awareness is not enabled.

D.

Logs are arriving from Pre-R81 gateways.

In R81.20 a new feature dynamic log distribution was added. What is this for?

    Configure the Security Gateway to distribute logs between multiple active Log Servers to support a better rate of Logs and Log Servers redundancy

    In case of a Management High Availability the management server stores the logs dynamically on the member with the most available disk space in /var/log

    Synchronize the log between the primary and secondary management server in case of a Management High Availability

A.

To save disk space in case of a firewall cluster local logs are distributed between the cluster members.

What is the minimum number of CPU cores required to enable CoreXL?

A.

1

B.

6

C.

2

D.

4

The Check Point installation history feature in provides the following:

A.

View install changes and install specific version

B.

Policy Installation Date only

C.

Policy Installation Date, view install changes and install specific version

D.

View install changes

Packet acceleration (SecureXL) identities connections by several attributes. Which of the attributes is NOT used for identifying connection?

A.

Source Port

B.

TCP Acknowledgment Number

C.

Source Address

D.

Destination Address

What are types of Check Point APIs available currently as part of R81.20 code?

A.

Security Gateway API Management API, Threat Prevention API and Identity Awareness Web Services API

B.

Management API, Threat Prevention API, Identity Awareness Web Services API and OPSEC SDK API

C.

OSE API, OPSEC SDK API, Threat Extraction API and Policy Editor API

D.

CPMI API, Management API, Threat Prevention API and Identity Awareness Web Services API

Using fw monitor you see the following inspection point notion E and i what does that mean?

A.

E shows the packet before the VPN encryption, i after the inbound firewall VM

B.

E shows the packet reaching the external interface, i leaving the internal interface

C.

E shows the packet after the VPN encryption, i before the inbound firewall VM

D.

E shows the packet leaving the external interface, i reaching the internal interface

What can we infer about the recent changes made to the Rule Base?

A.

Rule 7 was created by the ‘admin’ administrator in the current session

B.

8 changes have been made by administrators since the last policy installation

C.

The rules 1, 5 and 6 cannot be edited by the ‘admin’ administrator

D.

Rule 1 and object webserver are locked by another administrator

What is the purpose of the command "ps aux | grep twd"?

A.

You can check the Process ID and the processing time of the twd process.

B.

You can convert the log file into Post Script format.

C.

You can list all Process IDs for all running services.

D.

You can check whether the IPS default setting is set to Detect or Prevent mode

After verifying that API Server is not running, how can you start the API Server?

A.

Run command "set api start" in CLISH mode

B.

Run command "mgmt__cli set api start" in Expert mode

C.

Run command "mgmt api start" in CLISH mode

D.

Run command "api start" in Expert mode

Installations and upgrades with CPUSE require that the CPUSE agent is up-to-date. Usually the latest build is downloaded automatically. How can you verify the CPUSE agent build?

A.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status build

B.

In WebUI Status and Actions page or by running the following command in CLISH: show installer status version

C.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer status build

D.

In the Management Server or Gateway object in SmartConsole or by running the following command in CLISH: show installer agent

The “Hit count” feature allows tracking the number of connections that each rule matches. Will the Hit count feature work independently from logging and Track the hits if the Track option is set to “None”?

A.

No, it will work independently. Hit Count will be shown only for rules Track option set as Log or alert.

B.

Yes it will work independently as long as “analyze all rules” tick box is enabled on the Security Gateway.

C.

No, it will not work independently because hit count requires all rules to be logged.

D.

Yes it will work independently because when you enable Hit Count, the SMS collects the data from supported Security Gateways.

What is the correct order of the default “fw monitor” inspection points?

A.

i, o, l, O

B.

i, l, o, O

C.

1, 2, 3, 4

D.

l, i, O, o

When using the Mail Transfer Agent, where are the debug logs stored?

A.

$FWDIR/bin/emaild.mta. elg

B.

$FWDIR/log/mtad elg

C.

/var/log/mail.mta elg

D.

$CPDIR/log/emaild elg

Check Point Support in many cases asks you for a configuration summary of your Check Point system. This is also called:

A.

cpexport

B.

sysinfo

C.

cpsizeme

D.

cpinfo

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

A.

MySQL

B.

Postgres SQL

C.

MarisDB

D.

SOLR

Page: 3 / 7
Total 628 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved