Use backup technology in the guest operating system to create data-consistent checkpoints that don't include information ...