When comparing software iSCSI initiators with independent hardware initiators, what will be the
additional CHAP security levels available for a software implementation? (Choose two.)
A.
Do not use CHAP unless required by target.
B.
Use CHAP.
C.
Use CHAP unless prohibited by target.
D.
Do not use CHAP.