Inorder to verify the consistency of the slave LUN data with the source data and to protect slave LUN data, which of the following descriptions is incorrect:
A.
Create a virtual snapshot of the slave LUN and activate it, then map the snapshot LUN to the host for authentication.
B.
After the snapshot LUN is mapped to the host, the host can read and write the snapshot LUN.
C.
After the verification is completed, stop the upper-layer service application, release the LUN mapping, and finally delete the snapshot.
D.
Stop the snapshot before the host can write snapshot LUN.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit