A CIFS client uses a(n) ________ to obtain exclusive access to a remote file, ensuring that the client can cache data locally and maintain cache coherency.

a) spin lock
b) cache lock
c) opportunistic lock
d) network lock


c) opportunistic lock

Computer Science & Information Technology

You might also like to view...

The process of finding and correcting errors is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____________________ Service Setis a wireless network that does not use an access point.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Compressing images in a Word document does not change the file size until the file is saved

Indicate whether the statement is true or false

Computer Science & Information Technology

Thin provisioning allocates all configured space immediately, ensuring that space is available for the specified virtual disk.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology