Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A.
Deduplication
B.
Data snapshots
C.
LUN masking
D.
Storage multipaths
Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A.
Deduplication
B.
Data snapshots
C.
LUN masking
D.
Storage multipaths