Checkpoint 156-215.81 Exam
Check Point Certified Security Administrator R81 (Page 12 )

Updated On: 9-Feb-2026

Which two of these Check Point Protocols are used by ?

  1. ELA and CPD
  2. FWD and LEA
  3. FWD and CPLOG
  4. ELA and CPLOG

Answer(s): B

Explanation:

The two Check Point Protocols that are used by are FWD and LEA567. FWD is the Firewall Daemon that handles communication between different Check Point components, such as Security Management Server, Security Gateway, SmartConsole, etc. LEA is the Log Export API that allows external applications to retrieve logs from the Security Gateway or Security Management Server. Therefore, the correct answer is B. FWD and LEA.


Reference:

Border Gateway Protocol - Check Point Software, Check Point IPS Datasheet, List of valid protocols for services? - Check Point CheckMates



To ensure that VMAC mode is enabled, which CLI command you should run on all cluster members? Choose the best answer.

  1. fw ctl set int fwha vmac global param enabled
  2. fw ctl get int fwha vmac global param enabled; result of command should return value 1
  3. cphaprob ­a if
  4. fw ctl get int fwha_vmac_global_param_enabled; result of command should return value 1

Answer(s): B

Explanation:

To ensure that VMAC mode is enabled, you should run the command fw ctl get int fwha_vmac_global_param_enabled on all cluster members and check that the result of the command returns the value 11. This command shows the current value of the global kernel parameter fwha_vmac_global_param_enabled, which controls whether VMAC mode is enabled or disabled. VMAC mode is a feature that associates a Virtual MAC address with each Virtual IP address of the cluster, which reduces the need for Gratuitous ARP packets and improves failover performance1. The other options are incorrect. Option A is not a valid command. Option C is a command to show the status of cluster interfaces, not VMAC mode2. Option D is a command to show the value of a different global kernel parameter, fwha_vmac_global_param_enabled, which controls whether VMAC mode is enabled for all interfaces or only for non-VLAN interfaces1.


Reference:

How to enable ClusterXL Virtual MAC (VMAC) mode, cphaprob



What is the SOLR database for?

  1. Used for full text search and enables powerful matching capabilities
  2. Writes data to the database and full text search
  3. Serves GUI responsible to transfer request to the DLE server
  4. Enables powerful matching capabilities and writes data to the database

Answer(s): A

Explanation:

The SOLR database is used for full text search and enables powerful matching capabilities3 . SOLR is an open source enterprise search platform that provides fast and scalable indexing and searching of data. It supports advanced features such as faceting, highlighting, spell checking, synonyms, etc. The SOLR database is used by Check Point products such as SmartLog and SmartEvent to store and query logs and events3 . The other options are incorrect. Option B is false, as SOLR does not write data to the database, but only reads data from it. Option C is false, as SOLR does not serve GUI, but only provides a RESTful API for queries. Option D is false, as SOLR does not enable powerful matching capabilities and write data to the database, but only enables powerful matching capabilities.


Reference:

SOLR - Check Point Software, [Apache Solr]



Which of the following commands is used to monitor cluster members?

  1. cphaprob state
  2. cphaprob status
  3. cphaprob
  4. cluster state

Answer(s): A

Explanation:

The command that is used to monitor cluster members is cphaprob state. This command shows the state of each cluster member (Active, Standby, Down, etc.) and the reason for the state (OK, HA Failure, CCP Failure, etc.). It also shows the state synchronization status (Synchronized or Not Synchronized) and the uptime of each cluster member. The other options are incorrect. Option B is a command to show the status of cluster services, not cluster members. Option C is not a valid command by itself, as it requires an argument such as state, status, list, etc. Option D is not a valid command at all.


Reference:

[cphaprob]



Fill in the blank: Service blades must be attached to a ______________.

  1. Security Gateway
  2. Management container
  3. Management server
  4. Security Gateway container

Answer(s): A

Explanation:

Service blades must be attached to a Security Gateway. A Security Gateway is a device that enforces security policies on traffic that passes through it. A service blade is a software module that provides a specific security function, such as firewall, VPN, IPS, etc. A Security Gateway can have one or more service blades attached to it, depending on the license and hardware capabilities. The other options are incorrect. A management container is a virtualized environment that hosts a Security Management Server or a Log Server. A management server is a device that manages security policies and distributes them to Security Gateways. A Security Gateway container is not a valid term in Check

Point terminology.


Reference:

[Check Point R81 Security Management Administration Guide], [Check Point R81 CloudGuard Administration Guide]






Post your Comments and Discuss Checkpoint 156-215.81 exam prep with other Community members:

Join the 156-215.81 Discussion