Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
- A、ASM
- B、BiDirPIM
- C、PIM-SMRP
- D、RP-Switchover
- E、SourceSpecificMulticast
正确答案:A,B
答案解析:有

微信扫一扫手机做题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
微信扫一扫手机做题