Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

Which of the following can Pete, a security administrator, use to distribute the processing effort

when generating hashes for a password cracking program?

Which of the following can Pete, a security administrator, use to distribute the processing effort

when generating hashes for a password cracking program?

A.
RAID

B.
Clustering

C.
Redundancy

D.
Virtualization



Leave a Reply 0

Your email address will not be published. Required fields are marked *