Implementing Cisco Network Security (IINS v3.0) (#54)

Refer to the exhibit.

What is the effect of the given command sequence?

It configures IKE Phase 1.
It configures a site-to-site VPN tunnel.
It configures a crypto policy with a key size of 14400.
It configures IPSec Phase 2.