Multiple Choice
What is a valid step that should be taken to make using iSCSI technology on a network more secure?
A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Correct Answer:

Verified
Correct Answer:
Verified
Q31: How is authorization in vCenter Server handled?
Q32: How do the hostd, vpxa, and vpxd
Q33: What happens when ESXi hosts are put
Q34: Describe the differences between a hardware based
Q35: What statement regarding the use of lockdown
Q36: What kind of migration allows a powered-on
Q37: What statement regarding the use of iSCSI
Q38: While adding a new ESXi host and
Q39: What process is responsible for managing most
Q40: Match each item with a statement below.