For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)

For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)

For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)

A.
iSCSI node name

B.
hostname

C.
IPv4 address and subnet

D.
MAC address

E.
IPV6 address



Leave a Reply 0

Your email address will not be published. Required fields are marked *