Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A . Deduplication
B . Data snapshots
C . LUN masking
D . Storage multipaths
Answer: C
Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A . Deduplication
B . Data snapshots
C . LUN masking
D . Storage multipaths
Answer: C