• Here is the step by step approach to recover database from suspect mode