How should the architect implement database protection in Access?
A.
By making copies of the .MDB file
B.
By hosting the .MDB file on a network share
C.
By enabling Volume Shadow Copy
D.
By taking hypervisor snapshots of the VM running Access
