A company plans to use an application triggered virtual private network (VPN) connection. You need to ensure that a VPN connection can be used with the application trigger. Which VPN setting should you configure?
A. Split tunneling
B. Idle disconnect timeout
C. Tunnel type
D. Authentication method