Which of the following can Peter, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
CompTIA exam questions
Which of the following can Peter, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization