Checkpoint 156-315.81 Exam (page: 1)
Checkpoint Check Point Certified Security Expert R81
Updated on: 31-Mar-2026

Viewing Page 1 of 127

Identify the API that is not supported by Check Point currently.

  1. R81 Management API-
  2. Identity Awareness Web Services API
  3. Open REST API
  4. OPSEC SDK

Answer(s): C

Explanation:

Check Point currently supports four types of APIs: R81 Management API, Identity Awareness Web Services API, OPSEC SDK, and Gaia REST API. The Open REST API is not a valid option.


Reference:

Check Point APIs



SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based algorithms and has four dedicated components that constantly work together to protect mobile devices and their dat

  1. Which component is NOT part of the SandBlast Mobile solution?
  2. Management Dashboard
  3. Gateway
  4. Personal User Storage
  5. Behavior Risk Engine

Answer(s): C

Explanation:

SandBlast Mobile has four components: Management Dashboard, Gateway, Behavior Risk Engine, and On-Device Network Protection. Personal User Storage is not part of the SandBlast Mobile solution.


Reference:

SandBlast Mobile Architecture



What are the different command sources that allow you to communicate with the API server?

  1. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
  2. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
  3. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
  4. API_cli Tool, Gaia CLI, Web Services

Answer(s): B

Explanation:

You can communicate with the API server using three command sources: SmartConsole GUI Console, mgmt_cli Tool, and Gaia CLI. Web Services are not a command source, but a way to access the API server using HTTP requests.


Reference:

Check Point Management APIs



What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

  1. Anti-Bot is the only countermeasure against unknown malware
  2. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
  3. Anti-Bot is the only signature-based method of malware protection.
  4. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.

Answer(s): D

Explanation:

Anti-Bot is a post-infection malware protection that detects and blocks botnet communications from infected hosts to Command & Control servers. It is different from other Threat Prevention mechanisms that prevent malware from entering the network or executing on the hosts.


Reference:

Anti-Bot Software Blade



Which TCP-port does CPM process listen to?

  1. 18191
  2. 18190
  3. 8983
  4. 19009

Answer(s): D

Explanation:

The CPM process is the core process of the Security Management Server that handles all management operations. It listens to TCP-port 19009 by default.


Reference:

CPM process



Viewing Page 1 of 127



Share your comments for Checkpoint 156-315.81 exam with other users:

Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA