Which of these is correct based on the partial configuration shown?

Refer to the exhibit.

Which of these is correct based on the partial configuration shown?

Refer to the exhibit.

Which of these is correct based on the partial configuration shown?

A.
The policy is configured to use an authentication key of “rsa-sig.”

B.
The policy is configured to use hashing group sha-1.

C.
The policy is configured to use triple DES IPsec encryption.

D.
The policy is configured to use digital certificates.

E.
The policy is configured to use access list 101 to identify the IKE-protected traffic.



Leave a Reply 0

Your email address will not be published. Required fields are marked *