If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?
If you’re using iSCSI in a cloud environment, what must come from an external protocol or application?
A . Kerberos support
B . CHAP support
C . Authentication
D . Encryption
Answer: D
Explanation:
iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt
communications.
Latest CCSP Dumps Valid Version with 512 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments