To provide a secure cluster environment, an administrator will use VPN tunnels for communication
between the nodes in a cluster.
What must be defined on the nodes for communication across the VPN tunnel?

A.
Kerberos
B.
SSL shared keys
C.
Persistent IP Labels
D.
Public key encryption