Refer to the exhibit. What is the effect of the given command?
A.
It configure the network to use a different transform set between peers.
B.
It merges authentication and encryption methods to protect traffic that matches an ACL.
C.
It configures encryption for MD5 HMAC.
D.
It configures authentications as AES 256.
Explanation:
Because a transform set defines a method to encrypt traffic: esp-aes-256 and a method to
authenticate: esp-md5-hmac