Question: 1. What command is used to view the number of times an access list has been matched?
2. It has been determined that a computer with an IP address of 192.168.8.4 is flooding the network with ICMP packets. Create an extended access list to stop the flood.
3. What two features of a data packet does an intrusion box examine?