Home » VMware » VCP510 » When comparing software iSCSI initiators with independent hardware initiators, what are the additional CHAP security levels available for a software implementation?
When comparing software iSCSI initiators with independent hardware initiators, what are the additional CHAP security levels available for a software implementation? (Choose two.)
A. Do not use CHAP unless required by target
B. Use CHAP
C. Use CHAP unless prohibited by target
D. Do not use CHAP
Correct Answer: AB
Explanation/Reference:
CHAP Security Level
Do not use CHAP
The host does not use CHAP authentication. Select this option to disable authentication if it is currently enabled.
Supported by:
Software iSCSI
Dependent hardware iSCSI
Independent hardware iSCSI
Do not use CHAP unless required by target
The host prefers a non-CHAP connection, but can use a CHAP connection if required by the target.
Supported by:
Software iSCSI
Dependent hardware iSCSI
Use CHAP unless prohibited by target
The host prefers CHAP, but can use non-CHAP connections if the target does not support CHAP.
Supported by:
Software iSCSI
Dependent hardware iSCSI
Independent hardware iSCSI
Use CHAP
The host requires successful CHAP authentication. The connection fails if CHAP negotiation fails.
Supported by:
Software iSCSI
Dependent hardware iSCSI
http://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.storage.doc_50%2FGUID-3F97FB05-3C92-4040-84E7-D928555B3808.html