Certified Cloud Security Professional – CCSP – Question071
If you're using iSCSI in a cloud environment, what must come from an external protocol or application? A. Kerberos support B. CHAP support C. Authentication D. Encryption
Correct Answer: D
Explanation:
Explanation: iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.
Please disable your adblocker or whitelist this site!