For purposes of granting restricted access to statically configure iSCSI virtual targets, which three of these can be used to identify iSCSI initiators? (Choose three.)
A.
iSCSI node name
B.
host name
C.
IPv4 address and subnet
D.
MAC address
E.
IPv6 address
F.
iSCSI WWN