———- Refer to the following access list.# m* r6 P% G6 N; [5 ^6 K1 E' S
access-list 100 permit ip any any log! Z3 i; I2 Z4 w) z* q) L* L
After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?
& |/ C7 k4 X5 m# r) dA. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched./ a5 z0 q9 ? t0 C
B. A packet that matches access-list with the “log” keyword is fast switched.6 P/ t" \ Z. u
C. A packet that matches access-list with the “log” keyword is process switched.; F& ^1 J: N- \5 M. F& Z
D. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?* F- d7 A" ^; w4 v1 F/ I
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log4 ?+ s b+ R- L7 T: e, e
router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log
+ f d: P D) R! Srouter (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log/ m) ]4 w$ r* o' q$ u# z0 I
router (config)#access-list 101 permit ip any any
1 N% d J' v4 t: h' K$ u! B6 Trouter (config)#interface fastEthernet 1/0
6 |6 b" ^; C1 c% f1 ]router (config-if)#ip access-group 101 in9 u8 z0 q* J- O% E. |5 s8 F4 W
A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.- x/ y C5 |- K# x* W3 q! b" k. {
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.0 P5 e9 ~) h B* a# q
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.7 L0 r7 t4 a' u7 d# n" T
D. It prevents private internal addresses to be accessed directly from outside. Chose C, z1 x1 h/ F/ D4 ?* a- T# x# v
——————-
. m, x. g5 T7 Q1 n |