Which two statements describe the usage of the IS-IS overload bit technique? (Choose two)

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two)
A . If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic
B. It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.
C. It can be used to automatically synchronize the link-state database between Level 1 intermediate systems
D. It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.
E. It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Answer: A,D

Latest 400-007 Dumps Valid Version with 141 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments