Which scenario can be configured to use 3DES encryption for virtual machine traffic?
A. Two virtual machines communicating across a point-to-point IPSec VPN connection
B. Two virtual machines running on different ESXi hosts communicating across the same logical switch,
C. Two virtual machines communicating across a layer 2 bridge.
D. Two virtual machines configured to use NSX Data Security.