Which statements define exponential backoff technique? (Select two.)
A.
deployed for OSPF and IS-IS protocols
B.
allows network to react quickly to topology changes
C.
determines the validity of an ARP packet
D.
reduces the change rate in the Internet’s routing tables
E.
helps mitigate CAM table overflow attacks
F.
deployed for BGP and OSPF protocols