Create stable, secure, and scalable routing designs for IS-IS Flashcards
What is the default IS-IS metric for a T1 interface?
a. 5
b. 10
c. 64
d. 200
B. The default IS-IS cost metric for any interface type is 10
In IS-IS networks, the backup designated router (BDR) forms adjacencies to what
router or routers?
a. It forms an adjacency only with the DR.
b. It forms adjacencies with all routers.
c. The BDR only becomes adjacent when the DR is down.
d. There is no BDR in IS-IS.
D. IS-IS does not define BDRs.
Which statement is true regarding IS-IS?
a. IS-IS supports only OSI and IPv4 routing.
b. IS-IS supports only IPv4 and IPv6 routing.
c. IS-IS supports only OSI and IPv6 routing.
d. IS-IS supports OSI, IPv4, and IPv6 routing.
D. IS-IS supports routing of OSI, IPv4, and IPv6 protocols.
Which properties apply to both to OSPF and IS-IS? (Select two.)
a. Link-state routing protocol
b. Supports VLSM
c. Usually deployed in enterprise environment
d. Uses DUAL algorithm
e. Uses levels to establish routing hierarchy
A, B
Which of the following statements are true about IS-IS addressing? (Select two.)
a. Routers within an area must use unique area addresses.
b. The area address is used in Level 1 routing.
c. The system ID identifies the area.
d. The system ID for Level 1 routers must be unique within an area.
e. The system ID for Level 2 routers must be unique within the whole domain.
D, E
Which of the following statements are true about IS-IS route leaking? (Select two.)
a. It is done at L1–L2 routers.
b. For a prefix to be leaked, it must exist in the routing table as IS-IS Level 1 route.
c. You can use route leaking to solve suboptimal routing.
d. An up/down bit in the CDP field is used.
e. You need to disable all loop protection mechanisms
A, C
Which of the following do you need to take into account when designing IS-IS over
NBMA hub-and-spoke topology? (Select two.)
a. Hub-and-spoke interfaces must be configured with the same network type.
b. Hub interfaces can be configured as multipoint, while spokes should be configured as point-to-point.
c. Only L2 must be used over the NBMA network.
d. Hubs must be configured as L1/L2, whereas the spokes must be configured as
L1 only.
e. Hub WAN interfaces should be configured with point-to-point subinterfaces,
whereas the spokes should be configured as point-to-point interfaces.
A, E
Which statements are true about IS-IS routing? (Select two.)
a. By default, L1-only routers will receive only a default route from the L1/L2 border
routers.
b. By default, L1-only routers can receive only default route + summary from the
L1/L2 border routers.
c. L1-only routers can receive a default route + more specific from the L1/L2 border
routers, if route leaking is used
d. L1-only routers can receive a default route only from the L1/L2 border routers,
regardless whether route leaking is used or not.
e. The default route will not be injected into an L1 area from the L1/L2 border routers by default.
A, C
An enterprise needs to migrate its WAN core from EIGRP to IS-IS, and in the future
it wants to enable IS-IS across all other regional networks connected to the WAN
core. Which approach do you recommend this enterprise use to enable IS-IS across
the WAN core?
a. Start with L1 across the WAN core and then add the regional networks as L2
each.
b. Start with L1/L2 across the WAN core and then add the regional networks as L2.
c. Start with L2 across the WAN core and then add the regional networks as L1.
d. Start with L1/L2 across the WAN core and then add the regional network as
L1/L2 as well
C