You have installed iSCSI Initiator to enable block-based storage area networks in the network infrastructure of your organization. For security reasons, you need to configure authentication protocols in the network. Which of the following protocols will you use with iSCSI Initiator? Each correct answer represents a complete solution. Choose two.
WaldoWhereAmI
Highly Voted 5 years, 5 months agoTimock
Most Recent 4 years, 4 months ago