———- Refer to the following access list.' a: K, j& ]8 u: v
access-list 100 permit ip any any log
. H, l$ T1 n& `' f- t' j- N. A4 H4 jAfter applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?$ ~: l; N; K+ W+ s0 }
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.8 ?$ y% d2 F$ w# Y
B. A packet that matches access-list with the “log” keyword is fast switched.
: e" i( ]3 e9 T* e2 |* fC. A packet that matches access-list with the “log” keyword is process switched./ D2 k# Q+ ]# q' O, u0 r
D. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
% M5 z0 r& T( m- x: Irouter(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log" H- p9 O3 S3 k, k. G
router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log3 J( j( t# W3 d5 h8 b! G
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
. a- X" D. y6 ^& y* C, }router (config)#access-list 101 permit ip any any/ ^( Q( T: T3 n
router (config)#interface fastEthernet 1/0
& e0 O8 a- `* ~# Z6 {router (config-if)#ip access-group 101 in2 n! t5 M- o3 Z7 q8 O' v& d
A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.! a' `$ Z0 r) ]4 Y
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.
( G& x# ~1 e$ Z5 gC. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
. [ s7 M# e6 k6 T4 ID. It prevents private internal addresses to be accessed directly from outside. Chose C1 x) C- t, s1 S! y+ W! L
——————- / U, d2 j6 k( x# Q- v: k* L h3 K
|