List of questions
Related questions
Question 67 - NS0-520 discussion
You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).
In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
A.
CHAP creates a hash value for the username and shared secret.
B.
iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
C.
CHAP encrypts all iSCSI session I/O.
D.
iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Your answer:
0 comments
Sorted by
Leave a comment first