When comparing software iSCSI initiators with independent hardware initiators, what are the
additional CHAP security levels available for a software implementation? (Choose two.)
A.
Do not use CHAP unless required by target
B.
Use CHAP
C.
Use CHAP unless prohibited by target
D.
Do not use CHAP
Explanation:
http://searchvmware.techtarget.com/tip/VSphere-iSCSI-initiator-authenticationchanges-enhance-system-uptime-security