———- Refer to the following access list.6 O U3 _ K/ z( T6 \: N( e
access-list 100 permit ip any any log
) v5 v8 l; c+ j% W2 S: u9 {* GAfter applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?( j$ A# u% v# h% C H/ h
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.
6 r+ ^& B" I( q1 M- O$ pB. A packet that matches access-list with the “log” keyword is fast switched." ^% {& b, T* T2 X6 a) K
C. A packet that matches access-list with the “log” keyword is process switched.
' h& [$ c2 e6 D/ kD. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?3 K( I7 e5 f- k+ Q) ^( I+ i" B, K
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
) b+ T' z$ W) d, i+ f% A) M6 |2 z! Yrouter (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log
) u. X$ H! k2 ^0 f; K$ srouter (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
" j* Q& g! M& @% J( y- Drouter (config)#access-list 101 permit ip any any
: A- \+ L# r a" ^, q! F4 U5 d" {router (config)#interface fastEthernet 1/0
+ o: G0 a' I* |( j9 ~0 zrouter (config-if)#ip access-group 101 in+ j3 w1 A$ L/ V" x* |" |
A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.
! l1 Q1 t7 y7 f- }( VB. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet." V: X4 `8 Q7 _6 [3 a: V0 B
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
: H) |. i& T9 r& _+ [3 ID. It prevents private internal addresses to be accessed directly from outside. Chose C
* f0 i: ]0 m8 E4 O——————-
T7 i0 h$ E2 M' e |