As a storage administrator, you are implementing a storage solution for a customer. He has suggested that you implement a solution that use iSCSI to access the data. Which of the following is a security issue you need to discuss with him?

A. it use of block-level data
B. its use of file-level data
C. its inability to use CHAP authentication
D. its inability to use IPsec

A
Explanation: As iSCSI accesses blocks of data rather than files, any security breaches expose more information than would be with file-level access as in NAS.

Computer Science & Information Technology

You might also like to view...

You can add calculations for groups of data such as totals, averages, and counts to report columns

Indicate whether the statement is true or false

Computer Science & Information Technology

A vSphere Administrator sees the alarm: vSphere HA virtual machine failed to failover This occurred for a number of virtual machines on a particular ESXi host in a cluster with vSphere High Availability (HA) enabled. The virtual machines guest operating systems never reported a power event. What happened?

A. The virtual machines were vMotioned off of the ESXi host. B. The ESXi host is still running but has disconnected from the network. C. The ESXi host failed and vSphere HA successfully failed over the virtual machines. D. The previous virtual machine cloning operations failed to complete.

Computer Science & Information Technology