Scenario: A Citrix Architect is designing a new Citrix Virtual Apps and Desktops environment. The environment consists of 4 Citrix Hypervisor hosts, each running
10 virtual machines (VMs). To meet company security standards for the environment, the IT team will need to perform routine VM snapshots, data backups, and threat scans.
Which two matters should the architect consider when securing a backup plan for the company? (Choose two.)