A user’s permission set is modified so that they can no longer create alarms. What will happen to the alarms already created by this user?
A.
Alarms will be triggered if the event occurs.
B.
Alarms will never be triggered.
C.
Alarms will be triggered for critical state changes only.
D.
Only ESX host alarms will be triggered.