Of the following tunnel configurations, which one is most likely to use configured tunneling because it requires specifically configured end points to the tunnel?

A) Router-to-router
B) Site-to-site
C) Remote access
D) Intranet VPN