What information from the first node is used as the secret key during second node installation?
A. administrator password
B. application user password
C. security password
D. IP address
What information from the first node is used as the secret key during second node installation?
A. administrator password
B. application user password
C. security password
D. IP address