What is a valid step that should be taken to make using iSCSI technology on a network more secure?
A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Correct Answer:
Verified
Q6: What kind of migration allows a powered-on
Q7: What statement regarding the use of iSCSI
Q8: After removing a static software based iSCSI
Q9: After a virtual machine that has been
Q10: Implementing vCenter Server as a stand-alone Linux
Q12: The vCenter Server Linux appliance has a
Q13: Some VMware license keys can be split
Q14: When creating a cluster of ESXi hosts,
Q15: You would like to migrate a powered
Q16: What happens when ESXi hosts are put
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents