Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)
internet Protocol Security (IPsec)
B. ACLs
B. encryption at rest
Challenge Handshake Authentication Protocol (CHAP)
Submit