If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?

If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?
A . Kerberos support
B . CHAP support
C . Authentication
D . Encryption

Answer: D

Explanation:

iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt

communications.

Latest CCSP Dumps Valid Version with 512 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments