You work as a network engineer for . You study the exhibit carefully. From the configuration shown, what can be determined?() Exhibit: https://assets.asklib.com/images/image2/2018073016525496857.jpg

A . The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration. B . Since a voice VLAN is configured in this example, port security should be set for a maximum of 2. C . The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword. D . A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.

时间:2022-10-14 14:36:47 所属题库:CCNP(642-813)题库

相似题目