In this scenario, in which two ways are you securing your iSCSI implementation?
You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).
In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
A . CHAP creates a hash value for the username and shared secret.
B . iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
C . CHAP encrypts all iSCSI session I/O.
D . iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Answer: AD
Latest NS0-520 Dumps Valid Version with 334 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments