An administrator is implementing a new network-based storage device. In selecting a storage protocol, the
administrator would like the data in transit’s integrity to be the most important concern. Which of the following
protocols meets these needs by implementing either AES-CMAC or HMAC-SHA256 to sign data?
A.
SMB
B.
NFS
C.
FCoE
D.
iSCSI