What is the first step in the process for information protection using snapshots?
A . Application needs to be put into a quiesced state
B . Ensure that all the writes are committed
C . Capture a logically consistent virtual view of data
D . Release the application from quiesced state
Answer: A