What Event Action in an IPS signature is used to stop an attacker from communicating with a
network using an access-list?

A.
Request Block Host
B.
Deny Attacker Inline
C.
Deny Connection Inline
D.
Deny Packet Inline
E.
Request Block Connection