Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A.
RAID
B.
Clustering
C.
Redundancy
D.
Virtualization
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A.
RAID
B.
Clustering
C.
Redundancy
D.
Virtualization