———- Refer to the following access list.
- G U! T3 t% Jaccess-list 100 permit ip any any log
7 R8 m, ^* ] g) I0 ]After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?3 V4 b F2 H2 {- g2 o
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.; [( V+ a& _. Z
B. A packet that matches access-list with the “log” keyword is fast switched.4 p4 ]/ a+ w. p
C. A packet that matches access-list with the “log” keyword is process switched.
( b* k. d2 h) b( t& E/ lD. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?! v) O9 o7 j# d2 ~# _$ I+ g. w9 \) H
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
) A* p* a/ e6 X: Z/ R: zrouter (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log
* T, f6 c. ]" s& F6 jrouter (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
8 w. o. L3 }* ]+ [% I/ O9 R( Mrouter (config)#access-list 101 permit ip any any
* \4 N( Y1 Z W4 K' [! ~router (config)#interface fastEthernet 1/0
9 v% J2 [ J1 H h+ N, e9 crouter (config-if)#ip access-group 101 in
. ?$ q' @9 I3 R$ DA. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.7 x2 Z1 l4 b r
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.$ L% o3 E L, ^; r9 \8 A1 |
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.. i$ D4 p6 C# N# H. n' I. `8 H( F
D. It prevents private internal addresses to be accessed directly from outside. Chose C
* z4 e7 Y; s8 b6 O——————- # q9 |! T: ` i! f2 P! S# |
|