Exam4Training

How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?
A . Configure the sync network to operate within the DM
C . Secure each sync interface in a cluster with Endpoint.
D . Use a dedicated sync network.
E . Encrypt all sync traffic between cluster members.

Answer: C

Exit mobile version