Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?

Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?
A . Fabric binding
B . Zoning
C . Concatenating metaLUNs
D . LUN masking

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments