Which of the following is NOT a security recommendation when using iSCSI?
A. Use access control lists to control access.
B. Use strong authentication.
C. Use a single VLAN for SAN and regular traffic.
D. Encrypt sensitive data in transit and at rest.
C
Explanation: The main security issue with iSCSI involves its use of the regular IP network. Use a separate VLAN for SAN traffic.
You might also like to view...
A MouseHandler object implements which two interfaces?
a. MouseListener and MouseActionListener. b. MouseListener and MouseMotionListener. c. MouseListener and MouseEventListener. d. MouseListener only.
Write a method to quadruple the frequency of a sound.
What will be an ideal response?
The width for the header element in a liquid layout should be specified in ____.
A. ems B. pixels C. percentages D. none of the above; it should not be specified
An operation that is ____ is called a primitive operation of the computing agent carrying out the algorithm.
A. primary B. complementary C. basic D. unambiguous