Referring to the exhibit, which statement is correct about the IPsec configuration?
A.
Policy-based implementation is used.
B.
Dynamic VPN implementation is used.
C.
Route-based implementation is used.
D.
Hub-and-spoke implementation is used.
Referring to the exhibit, which statement is correct about the IPsec configuration?
A.
Policy-based implementation is used.
B.
Dynamic VPN implementation is used.
C.
Route-based implementation is used.
D.
Hub-and-spoke implementation is used.