Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?



A. RAID

B. Clustering

C. Redundancy

D. Virtualization



Answer: B


Learn More :

Network Security

Learn More Multiple Choice Question :