In this scenario, in which two ways are you securing your iSCSI implementation?

You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).

In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
A . CHAP creates a hash value for the username and shared secret.
B . iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
C . CHAP encrypts all iSCSI session I/O.
D . iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.

Answer: AD

Latest NS0-520 Dumps Valid Version with 334 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments