How is the iSCSI connection process typically made secure?
A. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B. The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C. The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D. The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Answer: A
You might also like to view...
Why is the nohighlight command extremely useful when using the Vim text editor?
What will be an ideal response?
Case C-1Will has completed the illustration of a flower and now he wants to make a few improvements to it. Will has applied an effect to an object in the course of his creation of the illustration. Where can he find this effect listed?
A. the Special Effects menu B. the Appearance panel C. the Effects taskbar D. the Effects menu bar
________ options include left, right, justified, and centered
Fill in the blank(s) with correct word
Inline elements can be shared with other elements on the same page only if those elements are ____ other elements.
A. placed below B. placed above C. nested within D. of higher precedence than