Checkpoint 156-315.81 Exam Questions
Check Point Certified Security Expert R81 (Page 7 )

Updated On: 16-Feb-2026

Connections to the Check Point R81 Web API use what protocol?

  1. HTTPS
  2. RPC
  3. VPN
  4. SIC

Answer(s): A

Explanation:

Connections to the Check Point R81 Web API use the HTTPS protocol. The Web API is a RESTful web service that allows you to perform management tasks on the Security Management Server using HTTP requests.


Reference:

Check Point Management APIs



Which command lists all tables in Gaia?

  1. fw tab ­t
  2. fw tab ­list
  3. fw-tab ­s
  4. fw tab -1

Answer(s): C

Explanation:

The fw tab -s command lists all tables in Gaia. The fw tab command displays information about the firewall tables, such as connections, NAT translations, SAM rules, etc. The -s option shows a summary of all tables.


Reference:

fw tab - Check Point Support Center



What is true about the IPS-Blade?

  1. In R81, IPS is managed by the Threat Prevention Policy
  2. In R81, in the IPS Layer, the only three possible actions are Basic, Optimized and Strict
  3. In R81, IPS Exceptions cannot be attached to "all rules"
  4. In R81, the GeoPolicy Exceptions and the Threat Prevention Exceptions are the same

Answer(s): A

Explanation:

In R81, IPS is managed by the Threat Prevention Policy. The Threat Prevention Policy is a unified policy that allows you to configure and enforce IPS, Anti-Bot, Anti-Virus, Threat Emulation, and Threat Extraction settings in one place.


Reference:

Threat Prevention Administration Guide



Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?

  1. Detects and blocks malware by correlating multiple detection engines before users are affected.
  2. Configure rules to limit the available network bandwidth for specified users or groups.
  3. Use UserCheck to help users understand that certain websites are against the company's security policy.
  4. Make rules to allow or block applications and Internet sites for individual applications, categories, and risk levels.

Answer(s): A

Explanation:

Detecting and blocking malware by correlating multiple detection engines before users are affected is not a feature associated with the Check Point URL Filtering and Application Control Blade. This feature is part of the Check Point SandBlast Network solution, which uses Threat Emulation and Threat Extraction technologies to prevent zero-day attacks. The other features are part of the URL

Filtering and Application Control Blade, which allows you to control access to web applications and sites based on various criteria.


Reference:

URL Filtering and Application Control Administration Guide



What is a feature that enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection?

  1. Stateful Mode
  2. VPN Routing Mode
  3. Wire Mode
  4. Stateless Mode

Answer(s): C

Explanation:

Wire Mode is a VPN-1 NGX feature that enables VPN connections to successfully fail over, bypassing Security Gateway enforcement. This improves performance and reduces downtime. Based on a trusted source and destination, Wire Mode uses internal interfaces and VPN Communities to maintain a private and secure VPN session, without employing Stateful Inspection. Since Stateful Inspection no longer takes place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. The VPN connection is no different from any other connections along a dedicated wire, thus the meaning of "Wire Mode".


Reference:

VPN Administration Guide






Post your Comments and Discuss Checkpoint 156-315.81 exam dumps with other Community members:

Join the 156-315.81 Discussion