———- Refer to the following access list.- Q$ g/ [# r% a" e4 n8 Z8 W/ v
access-list 100 permit ip any any log1 E+ d* Z3 E2 g+ l" H6 {4 \9 K# S/ r
After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?
6 ~. H( h/ p: b5 pA. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.
3 g" C P, r/ y- O# oB. A packet that matches access-list with the “log” keyword is fast switched.3 z' u% N; R, p _# u* X
C. A packet that matches access-list with the “log” keyword is process switched.
6 x) u4 b7 G* q. C0 `' l* n ]D. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
`3 U' k1 G- |7 t9 Frouter(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
% l8 {" l- l% `) ^% Brouter (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log" l1 s7 f5 p, p6 R: e6 }
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log/ a# L+ X% u3 }5 t7 A9 b
router (config)#access-list 101 permit ip any any
: z2 t, {# [7 O$ Krouter (config)#interface fastEthernet 1/0; b/ K6 [% k0 P. Y
router (config-if)#ip access-group 101 in
3 |- t$ L: U1 m* q" tA. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.
. S, v- O3 i' U R" kB. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.6 a; U4 e' @' B% v4 B
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
6 `; v2 V% E' _% A3 MD. It prevents private internal addresses to be accessed directly from outside. Chose C
/ A b& u5 G# b1 I1 d——————- % A. \6 k% k) a# y0 v
|