What authentication protocol can be used to allow an iSCSI target to authenticate to the iSCSI initiator?

A. Reverse CHAP
B. MSCHAPv2
C. Kerberos
D. PEAP


Answer: A

Computer Science & Information Technology

You might also like to view...

Case-based Critical Thinking QuestionsCase 11-1Ryan is new to the use of XML, so he has a lot of basic questions about the fundamentals, including some philosophical questions about the language. You tell Ryan that XML can be used to create XML vocabularies, which are markup languages tailored to contain specific pieces of information. Which of the following is NOT an example of a standard XML vocabulary?

A. BSML B. OMF C. XHTML D. CDF

Computer Science & Information Technology

A mixed cell reference is where the row or column needs to remain constant, but not both

Indicate whether the statement is true or false

Computer Science & Information Technology

What functions does the File System node allow an administrator to perform?

What will be an ideal response?

Computer Science & Information Technology

Match each term with the correct statement below.

A. The parent class of Exception B. Constructs a new exception with the specified detail message C. Object-oriented techniques to manage errors D. A language feature designed to make it harder to write bad code E. A process that is crucial to an organization F. Constructs a new exception with the specified cause and a detail message of cause.toString() G. Applications designed so that they continue to operate when some part of the system fails H. Should always be true if the program is working correctly I. A block of code you attempt to execute while acknowledging that an exception might occur J. Errors occurring during program exceution K. List of methods called during program execution L. Exceptions the programmer is not required to handle M. Any process crucial to an organization N. Indicates that a different method will catch the exception O. Language elements that make programming easier

Computer Science & Information Technology