During a corporate cyber espionage case in Austin, Texas, forensic investigators analyze how the company ' s storage systems were accessed during exfiltration. They discover that attackers mapped a shared folder accessible via SMB protocol from multiple departments while critical databases remained on a separate high-speed Fibre Channel storage fabric. Which storage model does the shared folder system represent?
Submit