Certification Provider: Check Point
Exam Name: Check Point Certified Security Expert R81
Exam Code: 156-315.81
Official Exam Time: 90 mins
Number of questions in the Official Exam: 100 Q&As
Latest update time in our database: May 30,2023
156-315.81 Official Exam Topics:
  • Topic1 : Lab 1: Upgrading to Check PointR77
  • Topic2 : CPC Core Process / Policy Installation Flow
  • Topic3 : Network Address Translation / Security Servers
  • Topic4 : Run cpinfo on the Security Management Server / Build, test and troubleshoot a VRRP deployment on an enterprise network.
  • Topic5 : ClusterXL: Load Sharing / Multicast Load Sharing
  • Topic6 : How Packets Travel Through a Unicast / Factors that Preclude Templating (Session Acceleration)
  • Topic7 : Processing Core Allocation / Allocating Processing Cores
  • Topic8 : Testing High Availability / Manage internal and external user access to resources for Remote Access or across a VPN.
  • Topic9 : Limitations of Authentication Flow / Enabling AD Query
  • Topic10 : Lab 4: Configuring SmartDashboard to Interface with Active Directory / Permanent Tunnels
  • Topic11 : Tunnel Testing / Tracking Options
  • Topic12 : VPN Environment Variables / Configuring LDAP User Access
  • Topic13 : Event Policy User Interface /

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?

Tom has been tasked to install Check Point R81 in a distributed deployment. Before Tom installs the systems this way, how many machines will he need if he does NOT include a SmartConsole machine in his calculations?
A . One machine, but it needs to be installed using SecurePlatform for compatibility purposes.
B . One machine
C . Two machines
D . Three machines

Answer: C

Explanation:

One for Security Management Server and the other one for the Security Gateway.

What has to be taken into consideration when configuring Management HA?

What has to be taken into consideration when configuring Management HA?
A . The Database revisions will not be synchronized between the management servers
B . SmartConsole must be closed prior to synchronized changes in the objects database
C . If you wanted to use Full Connectivity Upgrade, you must change the Implied Rules to allow FW1_cpredundant to pass before the Firewall Control Connections.
D . For Management Server synchronization, only External Virtual Switches are supported. So, if you wanted to employ Virtual Routers instead, you have to reconsider your design.

Answer: A

What is the mechanism behind Threat Extraction?

What is the mechanism behind Threat Extraction?
A . This a new mechanism which extracts malicious files from a document to use it as a counter-attack against its sender.
B . This is a new mechanism which is able to collect malicious files out of any kind of file types to destroy it prior to sending it to the intended recipient.
C . This is a new mechanism to identify the IP address of the sender of malicious codes and put it into the SAM database (Suspicious Activity Monitoring).
D . Any active contents of a document, such as JavaScripts, macros and links will be removed from the document and forwarded to the intended recipient, which makes this solution very fast.

Answer: D

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic.

Check Point Management (cpm) is the main management process in that it provides the architecture for a consolidated management console. It empowers the migration from legacy Client-side logic to Server-side logic.

The cpm process:
A . Allow GUI Client and management server to communicate via TCP Port 19001
B . Allow GUI Client and management server to communicate via TCP Port 18191
C . Performs database tasks such as creating, deleting, and modifying objects and compiling policy.
D . Performs database tasks such as creating, deleting, and modifying objects and compiling as well as policy code generation.

Answer: C

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?
A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.
B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
C . Machines in a ClusterXL High Availability configuration must be synchronized.
D . Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Answer: D

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?
A . System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob Cf if command.
B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.
C . Machines in a ClusterXL High Availability configuration must be synchronized.
D . Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers, and virtualized environments.

Answer: D