CompTIA Exam Questions

Which of the following can Pete, a security administrator, use to distribute the processing effort w

Which of the following can Pete, a security administrator, use to distribute the processing effort
when generating hashes for a password cracking program?

A.
RAID

B.
Clustering

C.
Redundancy

D.
Virtualization