You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is ________.
A. in a giveback mode
B. fenced off manually
C. powered on and accessible
D. powered off and inaccessible
You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is ________.
A. in a giveback mode
B. fenced off manually
C. powered on and accessible
D. powered off and inaccessible