———- Refer to the following access list.
8 _1 M+ Y0 q) y. |: Z1 p( Taccess-list 100 permit ip any any log4 u. N6 s2 h4 ?; s2 y& ]8 T2 }
After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?5 k1 t. y' X) u$ L$ L* @2 v2 q
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.
& b/ T7 _* i. j' dB. A packet that matches access-list with the “log” keyword is fast switched.
8 c$ W8 H2 q# T9 L8 n4 _3 bC. A packet that matches access-list with the “log” keyword is process switched.
; a) S9 Z, A( ]& oD. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?9 J, f! g/ O+ F4 k4 f! B
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log$ i7 v$ l D# X1 z; A7 D8 J
router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log1 Z4 c( w7 {& o( E
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
6 E/ {" t( O& rrouter (config)#access-list 101 permit ip any any
J8 D7 b, t, j& ^0 J* grouter (config)#interface fastEthernet 1/0
$ B+ |1 ^. A/ O, Q: f* J2 jrouter (config-if)#ip access-group 101 in
( c3 l% Z% q8 M Y3 d, J" nA. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.* O: p2 r C* ^- F# u9 E
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.; d F+ T7 Q0 C3 v9 S$ a5 I, j
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.0 h$ c0 g2 u4 i4 k
D. It prevents private internal addresses to be accessed directly from outside. Chose C/ z+ v, {1 m& {' T5 _
——————- - K% R2 p8 [4 M
|