what can be determined?

Refer to the exhibit

From the configuration shown, what can be determined?

Refer to the exhibit

From the configuration shown, what can be determined?

A.
The sticky addresses are only those manually configured MAC addresses enabled with the sticky keyword

B.
The remaining secure MAC addresses are learned dynamically, converted to sticky secure MAC addresses,
and added to the running configuration

C.
A voice VLAN is configured in this example, so port security should be set for a maximum of 2

D.
A security violation restricts the number of addresses to a maximum of 10 addresses per access VLAN and
voice VLAN. The port is shutdown if more than 10 devices per VLAN attempt to access the port



Leave a Reply 0

Your email address will not be published. Required fields are marked *