How does Check Point recommend that you secure the sync interface between gateways?
A . Configure the sync network to operate within the DM
C . Secure each sync interface in a cluster with Endpoint.
D . Use a dedicated sync network.
E . Encrypt all sync traffic between cluster members.
Answer: C
Latest 156-915.77 Dumps Valid Version with 846 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund