How is CHAP utilized to provide authentication for the iSCSI technology?

What will be an ideal response?


CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection. The verification is based on a predefined private key, also called a CHAP secret, that the initiator and target share. When using hardware-based HBA, ESXi supports CHAP authentication at the adapter level, so all targets receive the same CHAP secret from the iSCSI initiator. For software based iSCSI adapters, ESXi supports CHAP on a per-target level. After the connection is established, the initiator transmits SCSI commands over the IP network to the target service.

Computer Science & Information Technology

You might also like to view...

Package javafx.collections defines ObservableList and other observable collection interfaces. The package also contains class ________, which provides static methods for creating and manipulating observable collections.

a. FXObservable b. FXCreatObservable c. FXObservableList d. FXCollections

Computer Science & Information Technology

The U.S. Department of Defense started e-commerce

Indicate whether the statement is true or false

Computer Science & Information Technology

________ provides a real-time graph of computer performance, either in the current time or as logged historical data

a. Performance Monitor b. Reliability Monitor c. Resource Monitor d. Task Manager

Computer Science & Information Technology

What would happen if a semicolon is mistakenly placed at the end of a partial statement of a while loop with a Boolean expression and with an empty body?

What will be an ideal response?

Computer Science & Information Technology