You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).

You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).
In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
A. CHAP creates a hash value for the username and shared secret.
B. iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
C. CHAP encrypts all iSCSI session I/O.
D. iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.