You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).
In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
- CHAP creates a hash value for the username and shared secret.
- iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
- CHAP encrypts all iSCSI session I/O.
- iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Reveal Solution Next Question