Posted by: Pdfprep
Post Date: December 5, 2020
Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A . Deduplication
B . Data snapshots
C . LUN masking
D . Storage multipaths
Answer: C
Leave a Reply