How does Check Point recommend that you secure the sync interface between gateways?
A.
Configure the sync network to operate within the DMZ.
B.
Secure each sync interface in a cluster with Endpoint.
C.
Use a dedicated sync network.
D.
Encrypt all sync traffic between cluster members.