In an IPsec VPN, what determination does the access list make about VPN traffic?

A.
whether the traffic should be blocked
B.
whether the traffic should be permitted
C.
whether the traffic should be encrypted
D.
the peer to which traffic should be sent
Explanation:
Crypto access lists are used to define which IP traffic will be protected by crypto and which traffic
will not be protected by crypto (encrypted). These access lists are not the same as regular access
lists, which determine what traffic to forward or block at an interface. For example, access lists can
be created to protect all IP traffic between Subnet A and Subnet Y or Telnet traffic between Host A
and Host B.
Reference:http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfipsec.html#
wp1001139