———- Refer to the following access list.
8 P2 R9 K H5 S9 ^5 p6 waccess-list 100 permit ip any any log
. u) v5 ?; O0 i1 j. q4 sAfter applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?( {& y. O' z2 h K2 P1 v
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.8 g; ~0 a) {: m. `& w
B. A packet that matches access-list with the “log” keyword is fast switched.
8 r" K ]2 f( e" CC. A packet that matches access-list with the “log” keyword is process switched.. O4 N* Z' R; H$ z6 Z% F
D. A large amount of IP traffic is being permitted on the router. chose C ——————– What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?/ _% ]. P$ ` D F; X, g
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
" V4 C4 |8 k2 v% P; ^2 q7 c0 V/ rrouter (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log# S: B( O2 }8 _! ?5 x! m
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log0 q" ]2 z6 P- m' y$ v$ M
router (config)#access-list 101 permit ip any any
7 j/ m D) _& n8 T2 Hrouter (config)#interface fastEthernet 1/0' U& r' }: y5 g1 y5 s9 |
router (config-if)#ip access-group 101 in
+ X5 l; W* K. d8 AA. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.+ t' K& M" v- ]* ` Q& ~
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.
# u& g% d+ a4 a F6 lC. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.7 _4 x4 g3 }. L' t1 l: B R
D. It prevents private internal addresses to be accessed directly from outside. Chose C
0 c+ I% d6 j$ U7 J——————-
" t. ?" Y$ E0 s' d; V% E+ r8 y) R |