Which iSCSI security method encrypts data between the initiator and the target?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests
Explanation: IPSec is an encryption transport that can be used to secure any IP traffic including iSCSI.
2 Comments on “Which iSCSI security method encrypts data between the initiator and the target?”
mr_tienvusays:
I have the same idea. A
0
0
toyhoshisays:
CHAP is used for login authentication in ISCSI ,IPsec is a technology for data encryption ,both are security related but used for different purposes.
Challenge Handshake Authentication Protocol is a security protocol used to enable iSCSI initiators and targets to prove their identity to each other to ensure each connection is authorized between host and storage.
Internet Protocol Security is a suite of protocols for securing IP traffic by authenticating and encrypting each packet in the data stream.
I have the same idea. A
0
0
CHAP is used for login authentication in ISCSI ,IPsec is a technology for data encryption ,both are security related but used for different purposes.
Challenge Handshake Authentication Protocol is a security protocol used to enable iSCSI initiators and targets to prove their identity to each other to ensure each connection is authorized between host and storage.
Internet Protocol Security is a suite of protocols for securing IP traffic by authenticating and encrypting each packet in the data stream.
0
0