Which of these is correct based on the partial configuration shown?
A.
The policy is configured to use an authentication key of “rsa-sig.”
B.
The policy is configured to use hashing group sha-1.
C.
The policy is configured to use triple DES IPsec encryption.
D.
The policy is configured to use digital certificates.
E.
The policy is configured to use access list 101 to identify the IKE-protected traffic.