Which of the following technologies prevents an unautho…

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

A.
Deduplication

B.
Data snapshots

C.
LUN masking

D.
Storage multipaths



Leave a Reply 0

Your email address will not be published. Required fields are marked *