Checkpoint 156-315.81 Exam Questions
Check Point Certified Security Expert R81 (Page 12 )

Updated On: 17-Feb-2026

Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.

  1. Symmetric routing
  2. Failovers
  3. Asymmetric routing
  4. Anti-Spoofing

Answer(s): C

Explanation:

Sticky Decision Function (SDF) is required to prevent asymmetric routing in an Active-Active cluster. Asymmetric routing occurs when packets from a source to a destination follow a different path than packets from the destination to the source. This can cause problems with stateful inspection and

NAT. SDF ensures that packets from the same connection are handled by the same cluster member1.


Reference:

Check Point R81 ClusterXL Administration Guide



CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:

  1. MySQL
  2. Postgres SQL
  3. MarisDB
  4. SOLR

Answer(s): B

Explanation:

CPM process stores objects, policies, users, administrators, licenses and management data in a Postgres SQL database. This database is located in $FWDIR/conf and can be accessed using the pg_client command2. The other options are not the correct database type for CPM.


Reference:

Check Point R81 Security Management Administration Guide



If you needed the Multicast MAC address of a cluster, what command would you run?

  1. cphaprob ­a if
  2. cphaconf ccp multicast
  3. cphaconf debug data
  4. cphaprob igmp

Answer(s): D

Explanation:

The command cphaprob igmp can be used to display the Multicast MAC address of a cluster. This command shows the IGMP (Internet Group Management Protocol) information for each cluster interface, including the VRID (Virtual Router ID), the Multicast IP address, and the Multicast MAC address3. The other commands do not show the Multicast MAC address information.


Reference:

Check Point R81 ClusterXL Administration Guide



Which is NOT an example of a Check Point API?

  1. Gateway API
  2. Management API
  3. OPSC SDK
  4. Threat Prevention API

Answer(s): A

Explanation:

Gateway API is not an example of a Check Point API. Check Point APIs are interfaces that enable interactions with Check Point products using automation scripts or external applications. The examples of Check Point APIs are Management API, OPSEC SDK, Threat Prevention API, Identity Awareness Web Services API, and others4. Gateway API is not a valid Check Point API name.


Reference:

Check Point R81 Security Management Administration Guide, Check Point APIs



What are the three components for Check Point Capsule?

  1. Capsule Docs, Capsule Cloud, Capsule Connect
  2. Capsule Workspace, Capsule Cloud, Capsule Connect
  3. Capsule Workspace, Capsule Docs, Capsule Connect
  4. Capsule Workspace, Capsule Docs, Capsule Cloud

Answer(s): D

Explanation:

The three components for Check Point Capsule are Capsule Workspace, Capsule Docs, and Capsule Cloud. Capsule Workspace is a secure container app that allows users to access corporate data and applications from their mobile devices. Capsule Docs is a solution that protects documents with encryption and granular access control. Capsule Cloud is a cloud-based security service that enforces security policies on devices that are outside the corporate network.


Reference:

Check Point Capsule






Post your Comments and Discuss Checkpoint 156-315.81 exam dumps with other Community members:

Join the 156-315.81 Discussion