Prev Question
Next Question

Which of the following BEST describes the process of mapping storage initiators to targets?

A. Access control lists

B. Zoning

C. LUN masking

D. Obfuscation

Explanation:

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *