Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Internet Protocol Security (IPsec)
B.
ACLs
C.
encryption at rest
D.
Challenge Handshake Authentication Protocol (CHAP)
Explanation:
Reference: http://searchstorage.techtarget.com/magazineContent/Secure-iSCSI-storage
A&D
0
0