Which of the following BEST describes the process of mapping storage initiators to targets?
A.
Access control lists
B.
Zoning
C.
LUN masking
D.
Obfuscation
Explanation:
Which of the following BEST describes the process of mapping storage initiators to targets?
Which of the following BEST describes the process of mapping storage initiators to targets?
A.
Access control lists
B.
Zoning
C.
LUN masking
D.
Obfuscation
Explanation: