Which of the following is NOT a security recommendation when using iSCSI?

A. Use access control lists to control access.
B. Use strong authentication.
C. Use a single VLAN for SAN and regular traffic.
D. Encrypt sensitive data in transit and at rest.


C
Explanation: The main security issue with iSCSI involves its use of the regular IP network. Use a separate VLAN for SAN traffic.

Computer Science & Information Technology

You might also like to view...

A MouseHandler object implements which two interfaces?

a. MouseListener and MouseActionListener. b. MouseListener and MouseMotionListener. c. MouseListener and MouseEventListener. d. MouseListener only.

Computer Science & Information Technology

Write a method to quadruple the frequency of a sound.

What will be an ideal response?

Computer Science & Information Technology

The width for the header element in a liquid layout should be specified in ____.

A. ems B. pixels C. percentages D. none of the above; it should not be specified

Computer Science & Information Technology

An operation that is ____ is called a primitive operation of the computing agent carrying out the algorithm.

A. primary B. complementary C. basic D. unambiguous

Computer Science & Information Technology