Checkpoint 156-315.81 Exam (page: 25)
Checkpoint Check Point Certified Security Expert R81
Updated on: 16-Feb-2026

Viewing Page 25 of 127

Using mgmt_cli, what is the correct syntax to import a host object called Server_1 from the CLI?

  1. mgmt_cli add-host "Server_1" ip_address "10.15.123.10" --format txt
  2. mgmt_cli add host name "Server_1" ip-address "10.15.123.10" --format json
  3. mgmt_cli add object-host "Server_1" ip-address "10.15.123.10" --format json
  4. mgmt._cli add object "Server-1" ip-address "10.15.123.10" --format json

Answer(s): B

Explanation:

The correct syntax to import a host object using mgmt_cli is mgmt_cli add host name <name> ip- address <ip-address> --format <format>1. The name and ip-address parameters are mandatory, while the format parameter is optional and can be either json or txt. The other options are incorrect because they either use wrong parameters, wrong hyphens, or wrong object types.


Reference:

1:
Check Point Resource Library2



What are the steps to configure the HTTPS Inspection Policy?

  1. Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard
  2. Go to Application&url filtering blade > Advanced > Https Inspection > Policy
  3. Go to Manage&Settings > Blades > HTTPS Inspection > Policy
  4. Go to Application&url filtering blade > Https Inspection > Policy

Answer(s): A

Explanation:

The correct steps to configure the HTTPS Inspection Policy in Check Point R81 are as follows1:
Go to Manage&Settings > Blades > HTTPS Inspection > Configure in SmartDashboard.
Enable HTTPS Inspection and select the Policy tab.
Create a new HTTPS Inspection Layer or edit an existing one. Define the rules for inspecting HTTPS traffic based on the source, destination, service, and action.

Install the policy on the relevant gateways.
The other options are incorrect because they either use wrong blade names, wrong menu options, or wrong configuration steps.


Reference:

1: LAB:25 How to Configure HTTPS Inspection in Check Point Firewall R81(https://www.youtube.com/watch?v=NCvV7-R9ZgU)



You want to store the GAIA configuration in a file for later reference.
What command should you use?

  1. write mem <filename>
  2. show config ­f <filename>
  3. save config ­o <filename>
  4. save configuration <filename>

Answer(s): D

Explanation:

The correct command to store the GAIA configuration in a file is save configuration <filename>1. This will create a file with the current system level configuration in the home directory of the current user1. The other commands are incorrect because they either do not exist or do not save the configuration to a file.


Reference:

1: Backing up Gaia system level configuration(https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviews olutiondetails=&solutionid=sk102234)



How do Capsule Connect and Capsule Workspace differ?

  1. Capsule Connect provides a Layer3 VPN. Capsule Workspace provides a Desktop with usable applications.
  2. Capsule Workspace can provide access to any application.
  3. Capsule Connect provides Business data isolation.
  4. Capsule Connect does not require an installed application at client.

Answer(s): A

Explanation:

Capsule Connect and Capsule Workspace are both components of Check Point's remote access solution, but they serve different purposes and have distinct features:

A) Capsule Connect provides a Layer 3 VPN, which allows remote users to connect securely to their corporate network. It typically provides network-level access, allowing users to access resources on the corporate network. On the other hand, Capsule Workspace provides a secure workspace environment, including a virtual desktop with usable applications. It is more focused on providing application-level access to users in a secure manner.

B) This statement is partially true. Capsule Workspace is designed to provide secure access to a wide range of applications and resources, not limited to specific applications.

C) Capsule Connect does provide business data isolation by creating a secure VPN tunnel for remote users, ensuring that their network traffic is isolated from the public internet.

D) Capsule Connect usually requires an installed application or VPN client on the client device to establish a secure connection to the corporate network. This statement is not entirely accurate because an installed application or client is typically required.

Therefore, option A is the correct answer as it accurately distinguishes between Capsule Connect and Capsule Workspace based on their primary functionalities.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



John detected high load on sync interface.
Which is most recommended solution?

  1. For short connections like http service ­ delay sync for 2 seconds
  2. Add a second interface to handle sync traffic
  3. For short connections like http service ­ do not sync
  4. For short connections like icmp service ­ delay sync for 2 seconds

Answer(s): A

Explanation:

When John detects a high load on the sync interface, the recommended solution is to implement a delay in the sync process for short-lived connections like HTTP. Here's an explanation of each option:

A) Delaying the sync for 2 seconds for short connections like HTTP services is a common practice to reduce the load on the sync interface. This allows the interface to handle the incoming connections more effectively.

B) Adding a second interface to handle sync traffic might be a viable solution, but it can be more complex and costly compared to implementing a delay for short connections.

C) Not syncing short connections like HTTP services is not a recommended approach because it may lead to synchronization issues and potential data inconsistencies between cluster members.

D) Delaying the sync for ICMP (ping) services is not a common practice and may not effectively address the high load issue on the sync interface.

Therefore, option A is the most recommended solution as it addresses the issue by introducing a delay for short-lived connections, optimizing the sync process without causing synchronization problems.


Reference:

Check Point Certified Security Expert (CCSE) R81 documentation and learning resources.



Viewing Page 25 of 127



Share your comments for Checkpoint 156-315.81 exam with other users:

akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA