An administrator is configuring a protection domain for business critical applications, including SQL, Oracle, and Exchange. The administrator needs to evaluate the requirements and limitations for application-consistent snapshots.
What action should the administrator take while configuring application-consistent snapshots?
Submit