Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?

A. Warm site
B. Load balancing
C. Clustering
D. RAID


Answer: C. Clustering

Computer Science & Information Technology

You might also like to view...

To open the Text Pane, click the ____________________ button on the upper-left corner of the SmartArt graphic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are variables?

What will be an ideal response?

Computer Science & Information Technology

The rectangle that defines an ellipse is called its ________.

a) bounding box b) boundary c) elliptical rectangle d) elliptical box e) ellipse boundary

Computer Science & Information Technology

Each browser has its own external style sheet that specifies the appearance of different HTML elements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology