What is the first step in the process for information protection using snapshots?

A.
Application needs to be put into a quiesced state
B.
Ensure that all the writes are committed
C.
Capture a logically consistent virtual view of data
D.
Release the application from quiesced state