What is a valid step that should be taken to make using iSCSI technology on a network more secure?
A. The iSCSI traffic should be encrypted using CHAP.
B. The iSCSI traffic should be isolated to a dedicated and separate network.
C. The network should make use of hardware based iSCSI instead of software based iSCSI.
D. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Answer: B
You might also like to view...
You are asked to write a program that will display a letter that corresponds with a numeric rating system. The program should use a switch statement. The numeric rating is stored in a variable named rate and rate may equal 1, 2, 3, or 4. The corresponding letter is stored in a variable named grade and grade may be A, B, C, or D. Which is the test expression for this switch statement?
a. rate b. grade c. 1, 2, 3, or 4 d. A, B, C, or D
________ cable normally consists of four pairs of wires that are twisted around each other.
A. Coaxial B. Twisted-pair C. Fiber-optic D. Wi-Fi
A determinant is any column (or collection of columns) that determines another table.
Answer the following statement true (T) or false (F)
Discuss the popular myth that someone controls the Internet.
What will be an ideal response?