Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of resources?

Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of
resources?

Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of
resources?

A.
SCSI

B.
SSL

C.
TLS

D.
iSNS

Explanation:
Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management,
and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network.
iSNS provides management services similar to those found in Fibre Channel networks, allowing a
standard IP network to operate in much the same way that a Fibre Channel storage area network
does. Because iSNS is able to emulate Fibre Channel fabric services and manage both iSCSI and Fibre
Channel devices, an iSNS server can be used as a consolidated configuration point for an entire
storage network.

A is incorrect. Small Computer System Interface (SCSI) is the second most popular drive
interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE
and supports more devices. SCSI devices, such as hard disk drive and CD-ROM drive, are better
suited in a network environment in which many users access shared drives simultaneously. SCSI has
three standards: SCSI-1, SCSI-2, and SCSI-3.

B is incorrect. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing
the security of a message transmission on the Internet. SSL has recently been succeeded by
Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the
Internet’s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is
included as part of both the Microsoft and Netscape browsers and most Web server products. URLs
that require an SSL connection start with https: instead of http:.

C is incorrect. Transport Layer Security is a standard protocol used to secure Web
communications on the Internet or intranets by means of encryption. With the help of TLS, clients
can authenticate servers or servers can authenticate clients. TLS is the latest version of the Secure
Sockets Layer (SSL) protocol.



Leave a Reply 0

Your email address will not be published. Required fields are marked *