What port must be enabled in the Windows firewall on the iSCSITarget machine?
A. 443
B. 5900
C. 3389
D. 3260
Answer: D
You might also like to view...
When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirements have been approved. Suggest a model of a process for making these modifications that will ensure that the requirements document and the system implementation do not become inconsistent.
What will be an ideal response?
Which of the following IPSec protocols manages the exchange of encryption keys?
a. AH b. ESP c. IPComp d. IKE
Many forms use fill-in fields called placeholders.
Answer the following statement true (T) or false (F)
The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.
A. TCSEC B. MLS C. OTC D. COTS