找考题网-背景图
多项选择题

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast

热门试题