Refer to the exhibit.
What is the result of the configuration?
A. It enforces the distributed firewall.
B. It requires a reboot of the Cisco APIC before enabling the firewall rules.
C. It removes firewall information from the Cisco AVS.
D. It monitors all the TCP traffic without enforcing the firewall rules.