Refer to the exhibit.
What is the effect of the given command sequence?
A.
It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.
B.
It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.
C.
It defines IKE policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.
D.
It defines IKE policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.
A:
Crypto maps define the IPsec policy to be negotiated in the IPsec SA
A crypto map set consists of one or more crypto maps that have the same map name. You create a crypto map set when you create its first crypto map. The following command syntax creates or adds to a crypto map:
crypto map map-name seq-num match address access-list-name
The sequence number (seq-num) shown in the syntax above distinguishes one crypto map from another one with the same name. The sequence number assigned to a crypto map also determines its priority among the other crypto maps within a crypto map set. The lower the sequence number, the higher the priority.
The ACL assigned to a crypto map consists of all of the ACEs that have the same access list name, as shown in the following command syntax:
access-list access-list-name {deny | permit} ip source source-netmask destination destination-netmask