If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.
iSCSI (Internet Small Computer System Interface) is a popular protocol used to connect storage devices over a network. In a cloud environment, iSCSI can be used to connect virtual machines to remote storage. However, security must be considered when using iSCSI in a cloud environment, as data transmitted over the network may be vulnerable to interception and tampering.
When using iSCSI in a cloud environment, authentication is necessary to ensure that only authorized users can access the storage devices. This authentication can be provided by an external protocol or application, such as Kerberos or CHAP.
Kerberos is a network authentication protocol that uses a ticket-based system to authenticate users and services. It provides a secure means of authentication and can be used to authenticate iSCSI connections in a cloud environment.
CHAP (Challenge-Handshake Authentication Protocol) is a simple authentication protocol that uses a shared secret to authenticate users. It can also be used to authenticate iSCSI connections in a cloud environment.
Both Kerberos and CHAP provide authentication support for iSCSI in a cloud environment. Encryption is also important to protect the confidentiality of data transmitted over the network, but it is not necessary for iSCSI to function.