Which is the most secure method of connecting to an iSCSI storage array using an independent hardware iSCSI adapter?

Which is the most secure method of connecting to an iSCSI storage array using an independent hardware iSCSI adapter?
A. One-way CHAP
B. Mutual CHAP
C. Per-target CHAP
D. Per-subnet CHAP

microsoft-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.