ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 98 - 400-007 discussion

Report
Export

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

Answers
A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

Answers
B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

Answers
C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

Answers
D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Answers
E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Suggested answer: A, D
asked 10/10/2024
André Batista
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first