Which is the most secure method of connecting to an iSCSI storage array using an
independent hardware iSCSI adapter?
A.
Per-subnet CHAP
B.
Per-target CHAP
C.
One-way CHAP
D.
Mutual CHAP
Which is the most secure method of connecting to an iSCSI storage array using an
independent hardware iSCSI adapter?
Which is the most secure method of connecting to an iSCSI storage array using an
independent hardware iSCSI adapter?
A.
Per-subnet CHAP
B.
Per-target CHAP
C.
One-way CHAP
D.
Mutual CHAP