Refer to the exhibit. From the configuration shown, what can be determined?
A.
The sticky addresses will only be those manually configured MAC addresses enabled with
the sticky keyword.
B.
The remaining secure MAC addresses will be dynamically learned, converted to sticky
secure MAC addresses, and added to the running configuration.
C.
Since a voice VLAN is configured in this example, port security should be set for a
maximum of 2.
D.
A security violation will restrict the number of addresses to a maximum of 10 addresses
per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per
VLAN attempt to access the port.