Which of the following technologies prevents an unautho… seenagape 8 years ago Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information? A. Deduplication B. Data snapshots C. LUN masking D. Storage multipaths ← Previous question Next question →