On which device can Dead Peer Detection be configured when it is used for IPSec remote
access?
A.
the headend device
B.
Dead Peer Detection should not be used in IPSec remote access applications
C.
both the headend and remote devices
D.
the remote device