多项选择题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A. ASM B. BiDir PIM C. PIM-SM RP D. RP-Switchover E. Source Specific Multicast
单项选择题 WhatisthedefaultvalueoftheSPTthresholdinCiscorouters?()
多项选择题 Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()
单项选择题 TowhichofthesedoesIPmulticastsendpackets?()