Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?




A. RAID
B. Clustering
C. Redundancy
D. Virtualization


Answer: B


Learn More :

SY0-401

Learn More Multiple Choice Question :