Which statement is true about IKEv2 and IKEv1?
A.
IKEv2 can be configured to use EAP, but IKEv1 cannot.
B.
IKEv2 can be configured to use AES encryption, but IKEv1 cannot.
C.
IKEv2 can be configured to interoperate with IKEv1 on the other end.
D.
IKEv2 consumes more bandwidth than IKEv1.