A security audit reveals deficiencies in your company's FC zoning practices. Your manager asks you to make a recommendation to implement the most secure FC zoning possible. Your company is using switches from a single vendor.
What do you recommend?
A.
All zones should use frame-based hardware enforcement using pWWN identification exclusively for all configurations.
B.
All zones should use software-based enforcement using pWWN identification exclusively for all configurations.
C.
All zones should use frame-based hardware enforcement using destination port identification exclusively for all configurations.
D.
All zones should use software-based enforcement using destination port identification exclusively for all configurations.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit