Secure communication channels between Check Point modules (such as Security Management Server, Enforcement modules or OPSEC modules) can be set up using _____
A.
SIC
B.
SVM
C.
eBusiness Application
D.
Management Application
E.
Secure Virtual Network Architecture