During IKE negotiation, how do two peers compare policies? And what must policies match? (Select all that apply)
A.
Remote compares its local from highest (smallest numbered) to lowest (highest numbered),
B.
Remote compares its local from highest numbered to lowest numbered.
C.
Policies must match encryption, hash, authentication, Diffie-Hellman values, and lifetime < or equal.
D.
Policies must match hash, IPSec key, authentication, lifetime < or equal, and Diffie-Hellman values.