Which security method would be used to authenticate targets and initiators in an ISCSI environment?

Which security method would be used to authenticate targets and initiators in an ISCSI environment?
A. CHAP
B. LDAP
C. NIS
D. /etc/hosts

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.