Question 5: How is a split tunneling policy implemented? Choice: (choose correct answer): () Pool name included in an IKEv2 authorization policy () Crypto map included in an IKEv2 authorization policy () Routing protocol included in an IKEv2 authorization policy () ACL included in an IKEv2 authorization policy Answer: ACL included in an IKEv2 authorization policy