Security MCQ
Network Security
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
Answer: B
Learn More :