Which of the following methods can be used to secure access to iSCSI storage whenusing ESX server?
Which of the following methods can be used to secure access to iSCSI storage when
using ESX server? (Choose Two.)
Which of the following methods can be used to secure access to iSCSI storage when
using ESX server? (Choose Two.)