Which action should be taken to secure iSCSI devices in a vSphere environment?
A . Require ESXi hosts to use iSCSI port binding.
B . Require Secure Remote Protocol.
C . Require vCenter Enhanced Linked Mode.
D . Require ESXi hosts to authenticate to the target.
Answer: D