多項選擇題

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM
B.BiDirPIM
C.PIM-SMRP
D.RP-Switchover
E.SourceSpecificMulticast

微信掃碼免費搜題