Which scenario can be configured to use 3DES encryption for virtual machine traffic?
A.
Two virtual machines communicating across a point-to-point IPSec VPN connection.
B.
Two virtual machines running on different ESXi hosts communicating across the same
logical switch.
C.
Two virtual machines communicating across a layer 2 bridge.
D.
Two virtual machines configured to use NSX Data Security.