List of questions
Related questions
Question 98 - 400-007 discussion
Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )
lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic
It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.
It can be used to automatically synchronize the link-state database between Level 1 intermediate systems
It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.
It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems
0 comments
Leave a comment first