You have implemented a Check Point High Availability solution. You have defined a Gateway
Cluster and a group of Security Gateways with synchronized state tables. If the active Security
Gateway fails, what happens?
A.
Clear text connections survive the failure. Encrypted connections must be re-established.
B.
All connections must be re-established with the Security Gateway that assumes control.
C.
The control network is flooded with synchronization packets.
D.
Encrypted and clear text connections fail over to the Security Gateway that assumes control.
E.
The remaining Security Gateway force an election to determine who takes over.