Which iSCSI security method encrypts data between the initiator and the target?

Study for the NetApp Data ONTAP 8.0 7-Mode Administrator Test. Gain confidence with multiple choice questions, hints, and detailed explanations. Prepare to ace your certification exam!

Multiple Choice

Which iSCSI security method encrypts data between the initiator and the target?

Explanation:
When securing iSCSI traffic in motion, you want confidentiality so that data traveling between the initiator and the target isn’t readable by anyone on the network. IPSec does exactly that at the IP layer, typically using ESP to encrypt the payload, while also offering integrity and authentication. CHAP handles authentication only, not encryption. LUN masking controls which hosts can see which LUNs, not the encryption of traffic. Header and data digests provide integrity checks to detect tampering but do not conceal the content. So the method that actually encrypts the data in transit is IPSec.

When securing iSCSI traffic in motion, you want confidentiality so that data traveling between the initiator and the target isn’t readable by anyone on the network. IPSec does exactly that at the IP layer, typically using ESP to encrypt the payload, while also offering integrity and authentication. CHAP handles authentication only, not encryption. LUN masking controls which hosts can see which LUNs, not the encryption of traffic. Header and data digests provide integrity checks to detect tampering but do not conceal the content. So the method that actually encrypts the data in transit is IPSec.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy