An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?

A. Multicast
B. Unicast
C. Broadcast
D. Peer-to-peer


Answer: A. Multicast

Computer Science & Information Technology

You might also like to view...

Method________sets a Thread object’s name.

a) name. b) threadName. c) setName. d) None of the above.

Computer Science & Information Technology

Which of the following is NOT true about referential integrity?

A) The matching fields on both sides of the relationship have the same data types. B) You cannot enter a value in the foreign key field on the many side table that is not a primary key on the one side table. C) All foreign key fields and primary key fields must have values entered and cannot remain null. D) The primary key field values on the one side of the relationship must be unique.

Computer Science & Information Technology

What is the purpose of the policy definition section?

A. To explain terms, abbreviations, and acronyms used in the policy B. To refer the reader to additional information C. To provide the policy version number D. To provide information about policy exceptions

Computer Science & Information Technology

Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?

A. Audit management B. Mobile device management C. Incident management D. Change management

Computer Science & Information Technology