For purposes of granting restricted access to statically configure iSCSI virtual targets, which three
of these can be used to identify iSCSI initiators? (Choose three.)
A.
iSCSI node name
B.
hostname
C.
IPv4 address and subnet
D.
MAC address
E.
IPv6 address
F.
iSCSIWWN