Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?







A. RAID

B. Clustering

C. Redundancy

D. Virtualization





Answer: B


Computer Science

Learn More Multiple Choice Question :