By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the

By allowing storage communications to run on top of Transmission Control Protocol/Internet
Protocol (TCP/IP) with a Storage Area Network (SAN), the

By allowing storage communications to run on top of Transmission Control Protocol/Internet
Protocol (TCP/IP) with a Storage Area Network (SAN), the

A.
confidentiality of the traffic is protected.

B.
opportunity to sniff network traffic exists.

C.
opportunity for device identity spoofing is eliminated.

D.
storage devices are protected against availability attacks.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen + twenty =