You work as a network engineer for . You study the exhibit carefully. From the configuration shown, what can be determined?() Exhibit:
- A、The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
- B、Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
- C、The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
- D、A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
正确答案:A
答案解析:有

微信扫一扫手机做题