1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share

?
Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
7 0

Answer:

share level security model not required password for file share

Explanation:

The Common Internet File System ( CIFS ) formerly name is ( SMB ) a server message block    

it is develop by IBM and Intel for message based protocol

and there are 2 type authentication that are share level and user level

and in share level connection not required authentication

so its share level security model not required password for file share

 

You might be interested in
Why is it a good idea to view your HTML code in more than one web browser
Mandarinka [93]

Because some features may not be available on some browsers. By viewing it on different browsers, we can see if there's any incompatibilities and fix them.

5 0
3 years ago
Which of the following is most likely to include technical vocabulary?
Step2247 [10]
<span>C. a scientific article</span>
6 0
3 years ago
Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
wolverine [178]
A do you think is the answer
4 0
3 years ago
Read 2 more answers
The incandescent test lamp is used to check for the presence of
Arisa [49]
Http://americanhistory.si.edu/collections/search/object/nmah_995750
4 0
3 years ago
A string variable can hold digits such as account numbers and zip codes.<br><br> FALSE<br><br> TRUE
gavmur [86]
True. The second one is right
6 0
3 years ago
Other questions:
  • A technology _____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is
    13·1 answer
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • ____ occurs when two nodes simultaneously check a channel, determine that it is free, and begin to transmit.
    9·1 answer
  • Pls help
    15·2 answers
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • How do you change your name on your brainly profile
    14·2 answers
  • A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.
    13·1 answer
  • Refers to the capacity to form bonds with particular
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!