Question 1CBAC access lists include ip inspect statements t

Question 1:CBAC access lists include ip inspect statements that allow the inspection of the protocol to make sure that it is not tampered with before the protocol goes to the systems behind the firewall.In Zone-Based Firewall (ZBF), router interfaces are assigned to security zones and firewall inspection policy is applied to traffic moving between the zones. Zone-Based Policy Firewall enforces a secure inter-zone policy by default, such that a given interface in one zone cannot pass traffic to interfaces in other security zones until an explicit policy allowing traffic is defined. Inter-zone policies offer considerable flexibility and granularity, so different inspection policies can be applied to hosts, host groups, or subnets connected to the same router interface.In what way does ZBF support stateful firewall? Is stateful firewall capable of detecting malware such as keylogger or Trojan codes in the data that transits the firewall? Why/Why not?Question 2:As you may have learned in this week’s reading, standard and extended ACLs have many limitations. Some of the limitations stem from a lack of security as the ACLs do not take connection states into consideration. In addition, the standard and extended ACLS are not scalable. You also know that the more rules we have in an ACL, the more processing that the router would have to do especially if the matching entry is found near or at the bottom of the ACL.That said, note that Cisco has made improvement from one IOS Firewall to the next. For example, first they came up with Established ACL. Then they came up with Reflexive ACL. What was missing from Established ACL that Reflexive ACL was able to resolve? Please justify your answer. As always, a single sentence will not do justice in answering this question.