Which two technologies can be used to minimize routing on the DC Core layer from being compromised? (Choose two.)
A. policy-based routing
B. route peer authentication
C. route filtering
D. route summarization
E. route redistribution
Which two technologies can be used to minimize routing on the DC Core layer from being compromised? (Choose two.)
A. policy-based routing
B. route peer authentication
C. route filtering
D. route summarization
E. route redistribution
B,C