Refer to the exhibit. From the configuration shown, what can be determined? Select the best response.
A.
The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
B.
The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
C.
Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
D.
A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.