Which of the following can Pete, a security administrator, use to distribute the processing effort seenagape 11 years ago Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program? A.RAID B.Clustering C.Redundancy D.Virtualization ← Previous question Next question →