Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?
A. Warm site
B. Load balancing
C. Clustering
D. RAID
Answer: C. Clustering
Computer Science & Information Technology
You might also like to view...
Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A. Evil twin B. Rogue access point C. WEP attack D. War driving
Computer Science & Information Technology
Career counselors and experienced alumni can help you prepare for and secure an interview in your chosen field.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology