What is the function of a crypto map on a PIX Firewall?
A.
to specify which algorithms to use with the selected security protocol
B.
to configure a pre-shared authentication key and associate the key with an IPSec peer address
or host name
C.
to configure a pre-shared authentication key and associate the key with an IKE peer address or
host name
D.
to filter and classify the traffic to be protected