Free 156-315.81 Sample Questions — Check Point Certified Security Expert R81

Free 156-315.81 sample questions for the Check Point Certified Security Expert R81 exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 156-315.81 practice test

Looking for more? Click here to get the full PDF with 336+ practice questions for $10 for offline study and deeper preparation.

Question 1

Which Operating Systems are supported for the Endpoint Security VPN?

  • A. Windows and x86 Solaris
  • B. Windows and macOS computers
  • C. Windows and SPARC Solaris
  • D. Windows and Red Hat Linux
Show Answer
Correct Answer:
B. Windows and macOS computers
Question 2

Which one of the following is true about Threat Extraction?

  • A. Takes minutes to complete (less than 3 minutes)
  • B. Takes less than a second to complete
  • C. Works on MS Office and PDF files only
  • D. Always delivers a file
Show Answer
Correct Answer:
D. Always delivers a file
Question 3

What is NOT a Cluster Mode?

  • A. Load Sharing Unicast
  • B. Load Sharing Multicast
  • C. Active-Active
  • D. High Availability Multicast
Show Answer
Correct Answer:
D. High Availability Multicast
Question 4

Which statements below are CORRECT regarding Threat Prevention profiles in SmartConsole?

  • A. You can assign only one profile per gateway and a profile can be assigned to one or more rules
  • B. You can assign only one profile per gateway and a profile can be assigned to one rule Only
  • C. You can assign multiple profiles per gateway and a profile can be assigned to one rule only
  • D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules
Show Answer
Correct Answer:
D. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules
Question 5

To find records in the logs that shows log records from the Application URL Filtering Software Blade where traffic was dropped, what would be the query syntax?

  • A. blade:"application control" AND action:drop
  • B. blade;"application control" AND action;drop
  • C. blade: application control AND action:drop
  • D. (blade: application control AND action;drop)
Show Answer
Correct Answer:
A. blade:"application control" AND action:drop
Question 6

What is required for a certificate-based VPN tunnel between two gateways with separate management systems?

  • A. Mutually Trusted Certificate Authorities
  • B. Shared User Certificates
  • C. Shared Secret Passwords
  • D. Unique Passwords
Show Answer
Correct Answer:
A. Mutually Trusted Certificate Authorities
Question 7

For Management High Availability, which of the following is NOT a valid synchronization status?

  • A. Lagging
  • B. Collision
  • C. Never been synchronized
  • D. Down
Show Answer
Correct Answer:
D. Down
Question 8

Bob needs to know if Alice was configuring the new virtual cluster interface correctly. Which of the following Check Point commands is true?

  • A. cphaprob -a if
  • B. cphaprob state
  • C. cphaprob list
  • D. probcpha -a if
Show Answer
Correct Answer:
A. cphaprob -a if
Question 9

What is the command used to activate Multi-Version Cluster mode?

  • A. set cluster member mvc on in Clish
  • B. set cluster mvc on in Expert Mode
  • C. set cluster MVC on in Expert Mode
  • D. set mvc on in Clish
Show Answer
Correct Answer:
A. set cluster member mvc on in Clish
Question 10

In which deployment is the security management server and Security Gateway installed on the same appliance?

  • A. Standalone
  • B. Remote
  • C. Distributed
  • D. Bridge Mode
Show Answer
Correct Answer:
A. Standalone
Question 11

What is Dynamic Balancing?

  • A. It is a ClusterXL feature that switches an HA cluster into an LS cluster if required to maximize throughput
  • B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load
  • C. It is a new feature that is capable of dynamically reserve the amount of Hash kernel memory to reflect the resource usage necessary for maximizing the session rate
  • D. It is a CoreXL feature that assigns the SND to network interfaces to balance the RX Cache of the interfaces
Show Answer
Correct Answer:
B. It is a feature that uses a daemon to balance the required number of firewall instances and SNDs based on the current load
Question 12

Connections to the Check Point R80 Web API use what protocol?

  • A. SOAP
  • B. HTTP
  • C. SIC
  • D. HTTPS
Show Answer
Correct Answer:
D. HTTPS
Question 13

What are scenarios supported by the Central Deployment in SmartConsole?

  • A. Installation of Jumbo Hotfix on a ClusterXL environment in High Availability Mode
  • B. Upgrading a Standalone environment
  • C. Upgrading a Dedicated SmartEvent Server
  • D. Upgrading a Dedicated Log Server to R81.10
Show Answer
Correct Answer:
A. Installation of Jumbo Hotfix on a ClusterXL environment in High Availability Mode
Question 14

Automation and Orchestration differ in that:

  • A. Orchestration relates to codifying tasks, whereas automation relates to codifying processes
  • B. Orchestration is concerned with executing a single task, whereas automation takes a series of tasks and puts them all together into a process workflow
  • C. Automation involves the process of coordinating an exchange of information through web service interactions such as XML and JSON, but orchestration does not involve processes
  • D. Automation relates to codifying tasks, whereas orchestration relates to codifying processes
Show Answer
Correct Answer:
D. Automation relates to codifying tasks, whereas orchestration relates to codifying processes
Question 15

What a valid SecureXL paths in R81.10?

  • A. F2F (Slow path), Templated Path, PQX and F2V
  • B. F2F (Slow path), PXL, QXL and F2V
  • C. F2F (Slow path), Accelerated Path, PQX and F2V
  • D. F2F (Slow path), Accelerated Path, Medium Path and F2V
Show Answer
Correct Answer:
D. F2F (Slow path), Accelerated Path, Medium Path and F2V
Question 16

With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform within the applications. Mobile Access encrypts all traffic using:

  • A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender
  • B. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, no additional software is required
  • C. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, no additional software is required
  • D. HTTPS for web-based applications and AES or RSA algorithm for native applications. For end users to access the native application, they need to install the SSL Network Extender
Show Answer
Correct Answer:
A. HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender
Question 17

What command is used to manually failover a cluster during a zero downtime upgrade?

  • A. set cluster member down
  • B. cpstop
  • C. clusterXL_admin down
  • D. set clusterXL down
Show Answer
Correct Answer:
C. clusterXL_admin down
Question 18

Which view is NOT a valid CPVIEW view?

  • A. IDA
  • B. DLP
  • C. VPN
  • D. PDP
Show Answer
Correct Answer:
D. PDP
Question 19

Gaia has two default user accounts that cannot be deleted. What are those user accounts?

  • A. Admin and Default
  • B. Expert and Clish
  • C. Control and Monitor
  • D. Admin and Monitor
Show Answer
Correct Answer:
D. Admin and Monitor
Question 20

You have used the "set inactivity-timeout 120" command to prevent the session to be disconnected after 10 minutes of inactivity. However, the Web session is being disconnected after 10 minutes. Why?

  • A. The idle timeout for the web session is specified with the “set web session-timeout" command
  • B. The number specified is the amount of the idle timeout in seconds rather than in minutes. So you have to use the command "set inactivity-timeout 600" instead
  • C. Probably, you have forgotten to make sure that nobody is accessing the management server via the SmartConsole which locks the management database
  • D. The number of minutes is correct. Probably, you have forgotten to save this setting with the "save config" command
Show Answer
Correct Answer:
A. The idle timeout for the web session is specified with the “set web session-timeout" command

Aced these? Get the Full Exam

Download the complete 156-315.81 study bundle with 336+ questions in a single printable PDF.