You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com. The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista. ABC.com has two computers configured as follows:
ABC-SR01 configured as a domain File server.
ABC-SR02 configured as a domain File server.
ABC.com has recently deployed and configured an iSCSI Storage Area Network (SAN) for ABC- SR01 and ABC-SR02 for storage purposes.
How would you configure the iSCSI san to ensure the most secure security solution is used for traffic related to the Storage Area Network?
A.
By implementing IPSec security on the properties of iSCSI Initiator.
By configuring Windows Firewall to use inbound and outbound rules.
B.
By using Extensible Authentication Protocol Transport Layer Security (EAP TLS) authentication in iSCSI Initiator Properties.
C.
By implementing Kerberos v5 authentication on the properties of iSCSI Initiator.
By configuring Windows Defender to use inbound and outbound rules.
D.
By using Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in iSCSI Initiator Properties.
Explanation:
In order to implement the highest security available for communication to and from an iSCSI SAN, you need to implement IPSec security. You can access the IPSec security by opening the iSCSI Initiator Properties. After that you need to set inbound and outbound rules by using Windows Firewall.