PdfPrep.com

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A . Deduplication
B . Data snapshots
C . LUN masking
D . Storage multipaths

Answer: C

Exit mobile version