Question: Instructions: Read the scenario. What filesystems and file sharing protocols would you use and why? How would you ensure that only authorized developers are allowed

Instructions:

  1. Read the scenario.
    1. What filesystems and file sharing protocols would you use and why?
    2. How would you ensure that only authorized developers are allowed to access the files that they need?
    3. How would you configure fault tolerance for developer files?
  2. Use complete sentences and check your grammar and spelling.

Scenario:You have learned how SMB and NFS can be used to provide secure access to files on an NTFS or ReFS filesystem, as well as how quotas and file screens can further restrict filesystem access. You've also learned how auditing can record file system access, and DFS can be used to both provide centralized access to multiple filesystems, as well as replicate filesystem contents.

After joining a new tech startup, you've been tasked with designing and implementing the storage needed by the 30 developers in your organization.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!