Refer to the exhibit.
access-list 100 permit gre host 209.169.201.1 host 209.169.201.6
crypto isakmp policy 5
authentication pre-share
hash sha256
encryption aes
group 14
crypto isakmp key D@t@c3nt3r address 209.165.201.6
crypto ipsec transform-set My_Set esp-aes esp-sha-hmac
mode transport
crypto map MAP 10 ipsec-isakmp
set peer 209.165.201.6
set transform-set My_Set
match address 100
interface GigabitEthernet0/0
description outside_interface
no switchport
ip address 209.165.201.1 255.255.255.252
crypto map MAP
interface Tunnel100
ip address 192.168.100.1 255.255.255.0
ip mtu 1400
tunnel source GigabitEthernet0/0
tunnel destination 209.165.201.6
ip route 10.20.0.0 255.255.255.0 192.168.100.2 Tunnel100
access-list 100 permit gre host 209.169.201.6 host 209.169.201.1
crypto isakmp policy 5
authentication pre-share
hash sha256
encryption aes
group 14
crypto isakmp key D@t@c3nt3 address 209.165.201.6
crypto ipsec transform-set My_Set esp-aes esp-sha-hmac
mode transport
crypto map MAP 10 ipsec-isakmp
set peer 209.165.201.1
set transform-set My_Set
match address 100
interface GigabitEthernet0/1
description outside_interface
no switchport
ip address 209.165.201.6 255.255.255.252
crypto map MAP
interface Tunnel100
ip address 192.168.100.2 255.255.255.0
ip mtu 1400
tunnel source GigabitEthernet0/1
tunnel destination 209.165.201.1
ip route 10.10.0.0 255.255.255.0 192.168.100.1 Tunnel100
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).