Notifications
Clear all
Topic starter
03/11/2022 4:59 am
In order to verify that the data from the slave lun is consistent with the source lun, data protection needs to be performed on the slave lun. Which of the following descriptions is correct?
- A . Create a snapshot from the lun and activate it, then map the snapshot to the host for verification
- B . In order to improve the access efficiency during verification, the snapshot can be configured on the smarter
- C . The snapshot is mapped to the host, and the host can read and write
- D . Verify complete, stop business, unmap and delete snapshot
Suggested Answer: B