Certified Cloud Security Professional – CCSP – Question071

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

A.
Kerberos support
B. CHAP support
C. Authentication
D. Encryption

Correct Answer: D

Explanation:

Explanation: iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.