Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)

A.
Internet Protocol Security (IPsec)
B.
ACLs
C.
encryption at rest
D.
Challenge Handshake Authentication Protocol (CHAP)
Explanation:
Reference: http://searchstorage.techtarget.com/magazineContent/Secure-iSCSI-storage
A&D
0
0