Module 5 Mastery Exercise-1

.pdf

School

Colorado State University, Global Campus *

*We aren’t endorsed by this school

Course

300

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

7

Uploaded by AdmiralGiraffe1510

Report
11/29/23, 4:43 PM Module 5: Mastery Exercise: 23FD-CSC300-2 https://csuglobal.instructure.com/courses/83572/quizzes/747252 1/7 Module 5: Mastery Exercise Due No due date Points 10 Questions 10 Time Limit None Allowed Attempts Unlimited Instructions Attempt History Attempt Time Score LATEST Attempt 1 6 minutes 9 out of 10 Correct answers are hidden. Score for this attempt: 9 out of 10 Submitted Nov 29 at 3:43pm This attempt took 6 minutes. Complete the Mastery Exercises to assess your knowledge of the content covered in this module. You may repeat this quiz as many times as you need. The highest score will count toward your overall grade. Take the Quiz Again 1 / 1 pts Question 1 The________ establishes the initial logical connection between a server and a client. RPCs NTFS protocol candidate key
11/29/23, 4:43 PM Module 5: Mastery Exercise: 23FD-CSC300-2 https://csuglobal.instructure.com/courses/83572/quizzes/747252 2/7 mount protocol Correct. The mount protocolis the protocol for mounting a file system in a remote file system. 1 / 1 pts Question 2 The_______ represents an individual file defined by the Linux VFS. inode object NTFS list DNS common Internet file system (CIFS) That is correct. The inode object is the VFS representation of an individual file. 1 / 1 pts Question 3 The_______ represents an entire file system defined by the Linux VFS. superblock object NTFS list file object
11/29/23, 4:43 PM Module 5: Mastery Exercise: 23FD-CSC300-2 https://csuglobal.instructure.com/courses/83572/quizzes/747252 3/7 inode object That is correct. The superblock object is the VFS representation of the entire file system. 1 / 1 pts Question 4 In the case of Microsoft’s ______________,network information is used in conjunction with user authentication (user name and password) to create a network login that the server uses to decide whether to allow or deny access to a requested file system. Common Internet file system (CIFS) active directory DNS NTFS list That is correct. Common Internet file system(CIFS) is the Windows network file system, now used on many systems. 1 / 1 pts Question 5 The second major method uses a(n) _________in which remote directories are visible from a local machine. distributed file system (DFS)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help