Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

Posted by: Pdfprep Category: CAS-002 Tags: , ,

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A . Deduplication
B . Data snapshots
C . LUN masking
D . Storage multipaths

Answer: C

Leave a Reply

Your email address will not be published.