Which of the following is NOT a security recommendation when using iSCSI?
A. Use access control lists to control access.
B. Use strong authentication.
C. Use a single VLAN for SAN and regular traffic.
D. Encrypt sensitive data in transit and at rest.
C
Explanation: The main security issue with iSCSI involves its use of the regular IP network. Use a separate VLAN for SAN traffic.
Computer Science & Information Technology
You might also like to view...
Which of the following is the correct term describing the middle of the Internet, owned by various Internet service providers and consisting of a complex network of networks?
A) WAN B) LAN C) Internet core D) Internet access link
Computer Science & Information Technology
__________ is the default upper bound of a type parameter.
a. String. b. Comparable. c. Class. d. Object.
Computer Science & Information Technology