Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A、A.ASM
B、B.BiDirPIM
C、C.PIM-SMRP
D、D.RP-Switchover
E、E.SourceSpecificMulticast
A、A.ASM
B、B.BiDirPIM
C、C.PIM-SMRP
D、D.RP-Switchover
E、E.SourceSpecificMulticast
A、class
A、A. Shared single interface B、B. IP Address C、C. TCP-based hello packets D、D. MAC address
A、
A、A. TCP-based hello packets B、B. the impact
A、A. TCP-based hello packets B、B. the impact
A、 class