Exam4Training

Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?

Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?
A . Fabric binding
B . Zoning
C . Concatenating metaLUNs
D . LUN masking

Answer: D

Exit mobile version