If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

QuestionsCategory: CCSPIf you're using iSCSI in a cloud environment, what must come from an external protocol or application?
Admin Staff asked 6 months ago
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

A. Kerberos support

B. CHAP support

C. Authentication

D. Encryption








 

Suggested Answer: D

Community Answer: B

iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.

This question is in CCSP Certified Cloud Security Professional Exam
For getting Certified Cloud Security Professional (CCSP) Certificate






Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by ISC. 
Trademarks, certification & product names are used for reference only and belong to ISC.
The website does not contain actual questions and answers from ISC's Certification Exams.
Question Tags:

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.