How is the iSCSI connection process typically made secure?
A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Correct Answer:
Verified
Q1: What sort of network policy should you
Q2: What DRS mode has the ability to
Q3: Worms are viruses that are operating at
Q4: What feature, available in Windows 7 and
Q5: What statement regarding the use of iSCSI
Q7: The reconnaissance phase of an attack occurs
Q8: What component serves as the core of
Q9: A NIC can be assigned to more
Q10: What advanced virtual hard disk format, introduced
Q11: You are using a network attached storage
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents