For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)
A.
iSCSI node name
B.
hostname
C.
IPv4 address and subnet
D.
MAC address
E.
IPV6 address
For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)
For purposes of granting restricted access to statically configure iSCSI virtual targets, when three of these can be used to identify iSCSI? (Choose three)
A.
iSCSI node name
B.
hostname
C.
IPv4 address and subnet
D.
MAC address
E.
IPV6 address