When comparing software iSCSI initiators with independent hardware initiators, what are the
additional CHAP security levels available for a software implementation? (Choose two.)
A.
Do not use CHAP unless required by target.
B.
Use CHAP.
C.
Use CHAP unless prohibited by target.
D.
Do not use CHAP.
Note that the answer is C & D if the question is asking about the CHAP security levels available for a HARDWARE implimentation.