After creating and then activating a clone session, which process is used to satisfy a read requested to the clone target for a protected track?

A.
The protected track is written from the target device and then presented to secondary host.
B.
The protected track is copied from the source to the target and then presented to the secondary host.
C.
The protected track is copied from the target to the source and then presented to the primary host.
D.
The protected track is read from the source device and presented to the secondary host.
I think answer should be D
0
0
Yes, i too think it’s ‘D’.
Please correct me if i’m wrong.
0
0
Yes ans is D
0
0