Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)
A.
 Endpoint: Notify
B.
 Protect: Copy File
C.
 Network: Block HTTP/HTTPS
D.
 Protect: Quarantine File
E.
 Endpoint: Block
F.
 Network: Remove HTTP/HTTPS Content