As a storage administrator, you are implementing a storage solution for a customer. He has suggested that you implement a solution that use iSCSI to access the data. Which of the following is a security issue you need to discuss with him?
A. it use of block-level data
B. its use of file-level data
C. its inability to use CHAP authentication
D. its inability to use IPsec
A
Explanation: As iSCSI accesses blocks of data rather than files, any security breaches expose more information than would be with file-level access as in NAS.
You might also like to view...
what are the effectiveness objectives of a database?
What will be an ideal response?
If you run a query and a dialog box appears asking you to enter data, it is a ________
Fill in the blank(s) with correct word
You set new slide timings by using the _____ Timings feature.
A. Rehearse B. Practice C. Record D. Create
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?
A. open port B. secure port C. hardened port D. closed port