A security administrator wants to perform an audit of the company password file to ensure users
are not using personal information such as addresses and birthdays as part of their password. The
company employs 200,000 users, has virtualized environments with cluster and cloud-based
computing resources, and enforces a minimum password length of 14 characters. Which of the
following options is BEST suited to run the password auditing software and produce a report in the
SHORTEST amount of time?
A.
The system administrator should take advantage of the company’s cluster based computing
resources, upload the password file to the cluster, and run the password cracker on that platform.
B.
The system administrator should upload the password file to a virtualized de-duplicated storage
system to reduce the password entries and run a password cracker on that file.
C.
The system administrator should build a virtual machine on the administrator’s desktop, transfer
the password file to it, and run the a password cracker on the virtual machine.
D.
The system administrator should upload the password file to cloud storage and use on-demand
provisioning to build a purpose based virtual machine to run a password cracker on all the users.