which statement is correct about the IPsec configuration?

Refer to the Exhibit.

Referring to the exhibit, which statement is correct about the IPsec configuration?

Refer to the Exhibit.

Referring to the exhibit, which statement is correct about the IPsec configuration?

A.
Policy-based implementation is used.

B.
Dynamic VPN implementation is used.

C.
Route-based implementation is used.

D.
Hub-and-spoke implementation is used.



Leave a Reply 0

Your email address will not be published. Required fields are marked *