ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 67 - NS0-520 discussion

Report
Export

You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).

In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)

A.
CHAP creates a hash value for the username and shared secret.
Answers
A.
CHAP creates a hash value for the username and shared secret.
B.
iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
Answers
B.
iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
C.
CHAP encrypts all iSCSI session I/O.
Answers
C.
CHAP encrypts all iSCSI session I/O.
D.
iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Answers
D.
iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Suggested answer: A, D
asked 23/09/2024
Marco Santoro
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first