Posted by: Pdfprep
Post Date: November 7, 2020
The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible.
Which of the following is a consideration the designer must also address?
A . The IGPs should utilize authentication to avoid being the most vulnerable component
B . With SSM source or receiver attacks are not possible
C . With Shared Trees access control is always applied at the RP
D . Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a
PIM-SM network
Answer: B
Leave a Reply