Briefing Veritas Knowledge

Which two response rule actions should be avoided in Ex…

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)

A.
Endpoint: Notify

B.
Protect: Copy File

C.
Network: Block HTTP/HTTPS

D.
Protect: Quarantine File

E.
Endpoint: Block

F.
Network: Remove HTTP/HTTPS Content