Refer to the exhibit.
What is the effect of the given command sequence?
A. It configures a site-to-site VPN tunnel.
B. It configures IKE Phase 1.
C. It configures a crypto policy with a key size of 14400.
D. It configures IPSec Phase 2.
Refer to the exhibit.
What is the effect of the given command sequence?
A. It configures a site-to-site VPN tunnel.
B. It configures IKE Phase 1.
C. It configures a crypto policy with a key size of 14400.
D. It configures IPSec Phase 2.