多项选择题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast
相关考题
-
单项选择题
WhatisthedefaultvalueoftheSPTthresholdinCiscorouters?()
A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity -
多项选择题
Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()
A. Each router determines where to send the JOIN request.
B. The tree will be built based on the IP address of the E2 interface on router E
C. The best path to the source will be discovered in the unicast routing table on router B
D. The best path to the source will be discovered in the unicast routing table on router C
E. The best path to the source will be discovered in the unicast routing table on router E -
单项选择题
TowhichofthesedoesIPmulticastsendpackets?()
A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously
