of these can be used to identify iSCSI initiators?

For purposes of granting restricted access to statically configure iSCSI virtual targets, which three
of these can be used to identify iSCSI initiators? (Choose three.)

For purposes of granting restricted access to statically configure iSCSI virtual targets, which three
of these can be used to identify iSCSI initiators? (Choose three.)

A.
iSCSI node name

B.
hostname

C.
IPv4 address and subnet

D.
MAC address

E.
IPv6 address

F.
iSCSIWWN



Leave a Reply 0

Your email address will not be published. Required fields are marked *