What are two examples of active, malicious attacks possible in IP Storage transport environments? (Choose two)
A.
Eavesdropping
B.
Identity spoofing
C.
Man-in-the-middle
D.
Data origin authentication
What are two examples of active, malicious attacks possible in IP Storage transport environments? (Choose two)
What are two examples of active, malicious attacks possible in IP Storage transport environments? (Choose two)
A.
Eavesdropping
B.
Identity spoofing
C.
Man-in-the-middle
D.
Data origin authentication