Which security method would be used to authenticate targets and initiators in an ISCSI environment?
A. CHAP
B. LDAP
C. NIS
D. /etc/hosts
Which security method would be used to authenticate targets and initiators in an ISCSI environment?
A. CHAP
B. LDAP
C. NIS
D. /etc/hosts