In the exhibit, network 172.16.0.0/16 is redistributed into IS-IS in Area 49.0002. R1 must use R2 to
access 172.16.0.0/16. All other traffic leaving Area 49.0001 must use R4.Which three steps will
accomplish this task? (Choose three.)
Configure R1 to ignore the attached bit.
Disable the attached bit on R4 in Area 49.0001.
Enable an L2 adjacency on the link between R1 and R2.
Leak network 172.16.0.0/16 into L1 on R2.
Redistribute a static default route into L1 on R4.
5 Comments on “Which three steps will accomplish this task?”
L2 R1-R2??? Why? We already have 172.16/16 via leaking, so we only need default on R1 to R4 for any other traffic.
Agreed. But only in labs you would do this 🙂 .. If you don’t do ignore attached , there is probability it can traverse R2 if link to R4 is dead (as it will generate a def route as you referred).
I believe its weird options as you point out but given the options , those seem valid.
Correct answere is A D E
A,D,E correct answer
I believe that A,D,E are a correct answers.