Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?
A. Warm site
B. Load balancing
C. Clustering
D. RAID
Answer: C. Clustering
Computer Science & Information Technology
You might also like to view...
To open the Text Pane, click the ____________________ button on the upper-left corner of the SmartArt graphic.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What are variables?
What will be an ideal response?
Computer Science & Information Technology
The rectangle that defines an ellipse is called its ________.
a) bounding box b) boundary c) elliptical rectangle d) elliptical box e) ellipse boundary
Computer Science & Information Technology
Each browser has its own external style sheet that specifies the appearance of different HTML elements.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology