Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A、 ASM
B、 BiDir PIM
C、 PIM-SM RP
D、 RP-Switchover
E、 Source Specific Multicast