EMC Exam Questions

which process is used to satisfy a read requested to the clone target for a protected track?

After creating and then activating a clone session, which process is used to satisfy a read
requested to the clone target for a protected track?

A.
The protected track is written from the target device and then presented to secondary host.

B.
The protected track is copied from the source to the target and then presented to the secondary
host.

C.
The protected track is copied from the target to the source and then presented to the primary
host.

D.
The protected track is read from the source device and presented to the secondary host.