Explanation From HCIA-Security documents:
IPsec secures user traffic mainly through the ESP or AH mechanisms, delivering a combination of confidentiality and authentication-related protections. Data encryption (A) provides confidentiality so that intercepted packets cannot be read by unauthorized parties. This is typically delivered by ESP using symmetric encryption algorithms negotiated during IKE.
For authentication, IPsec provides data origin authentication (B) , meaning the receiver can confirm that packets were generated by the expected peer (the holder of the correct IPsec SA and keys). Along with that, IPsec performs a data integrity check (D) so that any modification to the protected portion of a packet in transit is detected; integrity is commonly provided using an HMAC or authenticated encryption method.
Finally, IPsec also includes anti-replay (C) protection. By using sequence numbers and a replay window, the receiver can detect and discard duplicated old packets, which prevents attackers from capturing encrypted/authenticated traffic and retransmitting it to disrupt sessions or attempt misuse.
Because IPsec secure transmission depends on encryption plus authentication, integrity, and replay protection working together, all four options are correct.