Which of the following CHAP Authentication mechanisms is available when using software iSCSI, but not Hardware iSCSI?
When implementing network security, what is an important configuration task that you should perform toassist in correlating network and security events?