what are the additional CHAP security levels available for a software implementation?

When comparing software iSCSI initiators with independent hardware initiators, what are the
additional CHAP security levels available for a software implementation? (Choose two.)

When comparing software iSCSI initiators with independent hardware initiators, what are the
additional CHAP security levels available for a software implementation? (Choose two.)

A.
Do not use CHAP unless required by target

B.
Use CHAP

C.
Use CHAP unless prohibited by target

D.
Do not use CHAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *