For information to pass securely between a Security Management Server and another Check Point component, what would NOT be required?
A.
The communication must be authenticated
B.
The communication must use two-factor or biometric authentication.
C.
The communication must be encrypted
D.
The component must be time-and-date synchronized with the security management server.