An administrator has configured storage for a server, and would like to ensure that other systems do not accidentally gain access to this server’s storage by plugging into the system’s port. Which of the following would provide a solution?
A.
RCSN
B.
Port zoning
C.
Virtual fabric
D.
WWN zoning