What authentication protocol can be used to allow an iSCSI target to authenticate to the iSCSI initiator?
A. Reverse CHAP
B. MSCHAPv2
C. Kerberos
D. PEAP
Answer: A
You might also like to view...
Case-based Critical Thinking QuestionsCase 11-1Ryan is new to the use of XML, so he has a lot of basic questions about the fundamentals, including some philosophical questions about the language. You tell Ryan that XML can be used to create XML vocabularies, which are markup languages tailored to contain specific pieces of information. Which of the following is NOT an example of a standard XML vocabulary?
A. BSML B. OMF C. XHTML D. CDF
A mixed cell reference is where the row or column needs to remain constant, but not both
Indicate whether the statement is true or false
What functions does the File System node allow an administrator to perform?
What will be an ideal response?
Match each term with the correct statement below.
A. The parent class of Exception B. Constructs a new exception with the specified detail message C. Object-oriented techniques to manage errors D. A language feature designed to make it harder to write bad code E. A process that is crucial to an organization F. Constructs a new exception with the specified cause and a detail message of cause.toString() G. Applications designed so that they continue to operate when some part of the system fails H. Should always be true if the program is working correctly I. A block of code you attempt to execute while acknowledging that an exception might occur J. Errors occurring during program exceution K. List of methods called during program execution L. Exceptions the programmer is not required to handle M. Any process crucial to an organization N. Indicates that a different method will catch the exception O. Language elements that make programming easier