What information from the first node is used as the secret key during second node installation?

What information from the first node is used as the secret key during second node
installation?

What information from the first node is used as the secret key during second node
installation?

A.
administrator password

B.
application user password

C.
security password

D.
IP address



Leave a Reply 0

Your email address will not be published. Required fields are marked *