When comparing software iSCSI initiators with independent hardware initiators, what are the additional CHAP security levels available for a software implementation? (Choose two.)
A. Do not use CHAP unless required by target
B. Use CHAP
C. Use CHAP unless prohibited by target
D. Do not use CHAP
Answer: A,B
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.