Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
- A、ASM
- B、BiDirPIM
- C、PIM-SMRP
- D、RP-Switchover
- E、SourceSpecificMulticast

微信扫一扫手机做题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

微信扫一扫手机做题