Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choo networkmanagers 13 years ago Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two.) A.ASM B.BiDir PIM C.PIM-SM RP D.RP-Switchover E.Source Specific Multicast Explanation: ← Previous question Next question →