You have deployed an ONTAP C190 cluster enabled with the iSCSI protocol. Your manager asks for available options to protect the data on your cluster using the native SnapMirror technology.
In this scenario, which two products would satisfy this request? (Choose two.)