Name CIFS opportunistic locks.

A.
Database locks that are passed from the application layer to CIFS to lock data at the record level
B.
A lock which a CIFS client requires by checking the “enable oplocks” box in the file”s properties
C.
A lock imposed by Kerberos on any network file accessed by a user, therefore disabling access form other clients
D.
Locks that allow file data caching on the client, therefore reducing traffic