Which iSCSI security method encrypts data between the initiator and the target?

Boost your skills for the NetApp Data ONTAP 8.0 7-Mode Administrator Test. Learn with flashcards and multiple choice questions, each question with hints and explanations. Get prepared for your certification!

Multiple Choice

Which iSCSI security method encrypts data between the initiator and the target?

Explanation:
When securing iSCSI traffic in motion, you want confidentiality so that data traveling between the initiator and the target isn’t readable by anyone on the network. IPSec does exactly that at the IP layer, typically using ESP to encrypt the payload, while also offering integrity and authentication. CHAP handles authentication only, not encryption. LUN masking controls which hosts can see which LUNs, not the encryption of traffic. Header and data digests provide integrity checks to detect tampering but do not conceal the content. So the method that actually encrypts the data in transit is IPSec.

When securing iSCSI traffic in motion, you want confidentiality so that data traveling between the initiator and the target isn’t readable by anyone on the network. IPSec does exactly that at the IP layer, typically using ESP to encrypt the payload, while also offering integrity and authentication. CHAP handles authentication only, not encryption. LUN masking controls which hosts can see which LUNs, not the encryption of traffic. Header and data digests provide integrity checks to detect tampering but do not conceal the content. So the method that actually encrypts the data in transit is IPSec.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy