A security audit reveals deficiencies in your company’s FC zoning practices. Your manager asks
you to make a recommendation to implement the most secure FC zoning possible. Your company
is using switches from a single vendor.
What do you recommend?

A.
All zones should use frame-based hardware enforcement using pWWN identification
exclusively for all configurations.
B.
All zones should use software-based enforcement using pWWN identification exclusively for all
configurations.
C.
All zones should use frame-based hardware enforcement using destination port identification
exclusively for all configurations.
D.
All zones should use software-based enforcement using destination port identification
exclusively for all configurations.
Explanation: