Protocol access is provided to data via what?

A.
a cluster
B.
a virtual filer
C.
a virtual server
D.
a high-available pair of storage systems
You must be logged in to post a comment.
For automatic user name mapping to occur for a CIFS and UNIX user name that are the same,
you must do what?
A.
Enter the CIFS user in the NIS database.
B.
Enter the user names in the /etc/hosts.equiv file.
C.
Use both a NIS server and a Domain Controller in the network.
D.
Nothing: mapping will occur if user name authentication is available.
Explanation:
You must be logged in to post a comment.
You must be logged in to post a comment.
C
0
0