As a storage administrator, you are implementing a storage solution for a customer. He has suggested that you implement a solution that use iSCSI to access the data. Which of the following is a security issue you need to discuss with him?

A. it use of block-level data
B. its use of file-level data
C. its inability to use CHAP authentication
D. its inability to use IPsec


A
Explanation: As iSCSI accesses blocks of data rather than files, any security breaches expose more information than would be with file-level access as in NAS.

Computer Science & Information Technology

You might also like to view...

what are the effectiveness objectives of a database?

What will be an ideal response?

Computer Science & Information Technology

If you run a query and a dialog box appears asking you to enter data, it is a ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You set new slide timings by using the _____ Timings feature.

A. Rehearse B. Practice C. Record D. Create

Computer Science & Information Technology

An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?

A. open port B. secure port C. hardened port D. closed port

Computer Science & Information Technology