You are about to restore a critical system, and you want to verify the objects. Which methods should you choose? (Select two)
A. omniotojverify command-line utility
B. ornnimcopy command-line utility
C. omniobjcopy command-line utility
D. Object Operations context of the Data Protector GUI
E. Devices and Media context of the Data Protector GUI