Strategies for returning a database with suspect pages to a consistent state while users are accessing it include reloading the database, or repairing it.
A clean database dump
A series of reliable transaction log dumps up to the point at which the database is recovered with suspect pages
A transaction log dump to a device immediately after the database is recovered to capture changes to the offline pages
Continuous transaction log dumps to devices while users work in the partially offline database