How is the iSCSI connection process typically made secure?

A. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B. The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C. The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D. The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.


Answer: A

Computer Science & Information Technology

You might also like to view...

Why is the nohighlight command extremely useful when using the Vim text editor?

What will be an ideal response?

Computer Science & Information Technology

Case C-1Will has completed the illustration of a flower and now he wants to make a few improvements to it. Will has applied an effect to an object in the course of his creation of the illustration. Where can he find this effect listed?

A. the Special Effects menu B. the Appearance panel C. the Effects taskbar D. the Effects menu bar

Computer Science & Information Technology

________ options include left, right, justified, and centered

Fill in the blank(s) with correct word

Computer Science & Information Technology

Inline elements can be shared with other elements on the same page only if those elements are ____ other elements.

A. placed below B. placed above C. nested within D. of higher precedence than

Computer Science & Information Technology