The network designer needs to consider the number of multicast applications and sources in the
network to provide the most robust network possible. Which of the following is a consideration the
designer must also address?
A.
The IGPs should utilize authentication to avoid being the most vulnerable component
B.
With SSM source or receiver attacks are not possible
C.
With Shared Trees access control is always applied at the RP
D.
Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on
a PIM-SM network