What Event Action in an IPS signature is used to stop an attacker from communicating with a network
using an access-list?
A.
Request Block Host
B.
Deny Attacker Inline
C.
Deny Connection Inline
D.
Deny Packet Inline
E.
Request Block Connection