Checkpoint 156-315.81 Exam Questions
Check Point Certified Security Expert R81 (Page 24 )

Updated On: 17-Feb-2026

Which statements below are CORRECT regarding Threat Prevention profiles in Smart Dashboard?

  1. You can assign only one profile per gateway and a profile can be assigned to one rule Only.
  2. You can assign multiple profiles per gateway and a profile can be assigned to one rule only.
  3. You can assign multiple profiles per gateway and a profile can be assigned to one or more rules.
  4. You can assign only one profile per gateway and a profile can be assigned to one or more rules.

Answer(s): C

Explanation:

In SmartDashboard, Threat Prevention profiles can be assigned to one or more rules. This means that you can have multiple profiles assigned to a single gateway, and each of these profiles can be associated with one or more rules. This allows for granular control over threat prevention settings for different rules or scenarios.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.



Using ClusterXL, what statement is true about the Sticky Decision Function?

  1. Can only be changed for Load Sharing implementations
  2. All connections are processed and synchronized by the pivot
  3. Is configured using cpconfig
  4. Is only relevant when using SecureXL

Answer(s): A

Explanation:

The Sticky Decision Function in ClusterXL is primarily used in Load Sharing implementations. In Load Sharing, the pivot member is responsible for determining the destination of new connections and ensures that traffic from the same source IP address is directed to the same cluster member. This ensures session stickiness for the same source IP, improving load sharing efficiency.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.



What is the name of the secure application for Mail/Calendar for mobile devices?

  1. Capsule Workspace
  2. Capsule Mail
  3. Capsule VPN
  4. Secure Workspace

Answer(s): A

Explanation:

The secure application for Mail/Calendar for mobile devices in Check Point is called "Capsule Workspace." Capsule Workspace provides secure access to email and calendar data on mobile devices while maintaining security policies and controls.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.



Where do you create and modify the Mobile Access policy in R81?

  1. SmartConsole
  2. SmartMonitor
  3. SmartEndpoint
  4. SmartDashboard

Answer(s): A

Explanation:

In R81, the Mobile Access policy is created and modified in SmartConsole. SmartConsole is the management interface for configuring and managing various security policies, including Mobile Access policies.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.



SmartConsole R81 requires the following ports to be open for SmartEvent R81 management:

  1. 19090,22
  2. 19190,22
  3. 18190,80
  4. 19009,443

Answer(s): D

Explanation:

To use SmartConsole R81 for managing SmartEvent R81, you need to have the following ports open:

Port 19009 for communication over HTTPS (443)
Port 19009 for communication over HTTP (80)
These ports are necessary for the SmartConsole to communicate with SmartEvent for management and monitoring purposes.


Reference:

Check Point Certified Security Expert R81 documentation and learning resources.






Post your Comments and Discuss Checkpoint 156-315.81 exam dumps with other Community members:

Join the 156-315.81 Discussion