Which is the most secure method of connecting to an iSCSI storage array using an independent hardware iSCSI adapter?

Which is the most secure method of connecting to an iSCSI storage array using an
independent hardware iSCSI adapter?

Which is the most secure method of connecting to an iSCSI storage array using an
independent hardware iSCSI adapter?

A.
Mutual CHAP

B.
Per-target CHAP

C.
Per-subnet CHAP

D.
One-way CHAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *