Correct D:
Check Point recommends using one of the following strategies to
secure the synchronization interfaces:
• Use a dedicated synchronization network.
• Connect the physical network interfaces of the cluster members directly using a crosscable.
In a cluster with three or more members, use a dedicated hub or switch.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Bombast
10 months, 2 weeks ago85rod
1 year ago