An engineer deploys a new Cisco Nexus 5000 Series Switch in an existing environment with strict security policies. The new device should meet these requirements:
• Secure end-user ports with minimum configuration effort.
• Log security breaches and require manual recovery.
• Retain the switch configuration if the device restarts.
Which configuration must be used?