If you enable authentication on an iSCSI target, what authentication protocol is used?

a. PAP
b. CHAP
c. EAP
d. PEAP

b. CHAP

Computer Science & Information Technology

You might also like to view...

You can view a hyperlink for an object or picture by clicking the object in the document

Indicate whether the statement is true or false

Computer Science & Information Technology

(De Morgan’s Laws) In this chapter, we discussed the logical operators &&, || and !. De Morgan’s Laws can sometimes make it more convenient for us to express a logical expression. These laws state that the expression !(condition1 && condition2) is logically equivalent to the expression (!condition1 || !condition2). Also, the expression !(condition1 || condition2) is log- ically equivalent to the expression (!condition1 && !condition2). Use De Morgan’s Laws to write equivalent expressions for each of the following, and then write a program to show that the original expression and the new expression are equivalent in each case.

a. ``` !( x < 5 ) && !( y >= 7 ) ``` b. ``` !( a == b ) || !( g != 5 ) ``` c. ``` !( ( x <= 8 ) && ( y > 4 ) ) ``` d. ``` !( ( i > 4 ) || ( j <= 6 ) ) ```

Computer Science & Information Technology