Which of the following BEST describes the process of mapping storage initiators to targets? seenagape 10 years ago Which of the following BEST describes the process of mapping storage initiators to targets? A.Access control lists B.Zoning C.LUN masking D.Obfuscation ← Previous question Next question →