If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?
A.
DES
B.
3DES
C.
AES
D.
AES192
E.
AES256
Explanation:
Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the
strongest algorithm that is supported by each peer.