Checkpoint 156-215.81 Exam
Check Point Certified Security Administrator R81 (Page 15 )

Updated On: 9-Feb-2026

Fill in the blank: In order to install a license, it must first be added to the ____________.

  1. User Center
  2. Package repository
  3. Download Center Web site
  4. License and Contract repository

Answer(s): D

Explanation:

In order to install a license, it must first be added to the License and Contract repository. The License and Contract repository is a centralized database that stores all the licenses and contracts for Check Point products. It allows you to manage, activate, and attach licenses to your Check Point products.


Reference:

Check Point Security Management Administration Guide R81, p. 19-20



When logging in for the first time to a Security management Server through SmartConsole, a fingerprint is saved to the:

  1. Security Management Server's /home/.fgpt file and is available for future SmartConsole authentications.
  2. Windows registry is available for future Security Management Server authentications.
  3. There is no memory used for saving a fingerprint anyway.
  4. SmartConsole cache is available for future Security Management Server authentications.

Answer(s): D

Explanation:

When logging in for the first time to a Security Management Server through SmartConsole, a fingerprint is saved to the SmartConsole cache and is available for future Security Management Server authentications. The fingerprint is a unique identifier of the Security Management Server that is used to verify its identity and prevent man-in-the-middle attacks. The SmartConsole cache is a local folder on the client machine that stores temporary files and settings.


Reference:

Check Point Security Management Administration Guide R81, p. 25-26



Fill in the blank: By default, the SIC certificates issued by R80 Management Server are based on the ____________ algorithm.

  1. SHA-256
  2. SHA-200
  3. MD5
  4. SHA-128

Answer(s): A

Explanation:

By default, the SIC certificates issued by R80 Management Server are based on the SHA-256 algorithm1. SHA-256 is a secure hash algorithm that produces a 256-bit digest. SHA-200, MD5, and SHA-128 are not valid algorithms for SIC certificates.


Reference:

SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)



Which message indicates IKE Phase 2 has completed successfully?

  1. Quick Mode Complete
  2. Aggressive Mode Complete
  3. Main Mode Complete
  4. IKE Mode Complete

Answer(s): A

Explanation:

Quick Mode Complete is the message that indicates IKE Phase 2 has completed successfully2. IKE Phase 2 is also known as Quick Mode or Child SA in IKEv1 and IKEv2 respectively. Aggressive Mode and Main Mode are part of IKE Phase 1, which establishes the IKE SA. IKE Mode is not a valid term for IKE negotiation.


Reference:

How to Analyze IKE Phase 2 VPN Status Messages, IKEv2 Phase 1 (IKE SA) and Phase 2 (Child SA) Message Exchanges, Understand IPsec IKEv1 Protocol



Administrator Dave logs into R80 Management Server to review and makes some rule changes. He notices that there is a padlock sign next to the DNS rule in the Rule Base.



What is the possible explanation for this?

  1. DNS Rule is using one of the new feature of R80 where an administrator can mark a rule with the padlock icon to let other administrators know it is important.
  2. Another administrator is logged into the Management and currently editing the DNS Rule.
  3. DNS Rule is a placeholder rule for a rule that existed in the past but was deleted.
  4. This is normal behavior in R80 when there are duplicate rules in the Rule Base.

Answer(s): B

Explanation:

The padlock sign next to the DNS rule in the Rule Base indicates that another administrator is logged into the Management and currently editing the DNS Rule1. This is a feature of R80 that allows multiple administrators to work on the same policy simultaneously. The padlock sign prevents other administrators from modifying the same rule until the editing administrator publishes or discards the changes2. The other options are not valid explanations for the padlock sign.


Reference:

156-215.80 :
Check Point Certified Security Administrator (CCSA R80) : Part 19, Multi-User Policy Editing






Post your Comments and Discuss Checkpoint 156-215.81 exam prep with other Community members:

Join the 156-215.81 Discussion