When comparing software iSCSI initiators with independent hardware initiators, what are the additional CHAP security levels available for a software implementation? (Choose two.)

When comparing software iSCSI initiators with independent hardware initiators, what are the additional CHAP security levels available for a software implementation? (Choose two.) 






A. Do not use CHAP unless required by target
B. Use CHAP
C. Use CHAP unless prohibited by target
D. Do not use CHAP







Answer: A,B


Learn More :