Question: Instructions: Read the scenario. What filesystems and file sharing protocols would you use and why? How would you ensure that only authorized developers are allowed
Instructions:
- Read the scenario.
- What filesystems and file sharing protocols would you use and why?
- How would you ensure that only authorized developers are allowed to access the files that they need?
- How would you configure fault tolerance for developer files?
- Use complete sentences and check your grammar and spelling.
Scenario:You have learned how SMB and NFS can be used to provide secure access to files on an NTFS or ReFS filesystem, as well as how quotas and file screens can further restrict filesystem access. You've also learned how auditing can record file system access, and DFS can be used to both provide centralized access to multiple filesystems, as well as replicate filesystem contents.
After joining a new tech startup, you've been tasked with designing and implementing the storage needed by the 30 developers in your organization.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
