CompTIA Exam Questions

Which of the following technologies prevents an unautho…

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

A.
Deduplication

B.
Data snapshots

C.
LUN masking

D.
Storage multipaths