which statement is correct about the IPsec configuration?

Click the Exhibit button.
Referring to the exhibit, which statement is correct about the IPsec configuration?

Click the Exhibit button.
Referring to the exhibit, which statement is correct about the IPsec configuration?

A.
Policy-based implementation is used.

B.
Dynamic VPN implementation is used.

C.
Route-based implementation is used.

D.
Hub-and-spoke implementation is used.



Leave a Reply 0

Your email address will not be published. Required fields are marked *