Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two

Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two.)

Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two.)

A.
ASM

B.
BiDir PIM

C.
PIM-SM RP

D.
RP-Switchover

E.
Source Specific Multicast

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *