Which of the following represents important technical controls for securing a SAN storage infrastructure?
(Select TWO).
A.
Synchronous copy of data
B.
RAID configuration
C.
Data de-duplication
D.
Storage pool space allocation
E.
Port scanning
F.
LUN masking/mapping
G.
Port mapping