You work as a network engineer for . You study the exhibit carefully. From the configuration shown, what can be determined?() Exhibit:
- AThe remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
- BSince a voice VLAN is configured in this example, port security should be set for a maximum of 2.
- CThe sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
- DA security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.