ISC Exam Questions

By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol

By allowing storage communications to run on top of Transmission Control Protocol/Internet
Protocol (TCP/IP) with a Storage Area Network (SAN), the

A.
confidentiality of the traffic is protected.

B.
opportunity to sniff network traffic exists.

C.
opportunity for device identity spoofing is eliminated.

D.
storage devices are protected against availability attacks.