Which two response rule actions should be avoided in Exact Data Matching (EDM) policies?
(Select two.)
A.
Protect: Quarantine File
B.
Network: Remove HTTP/HTTPS Content
C.
Endpoint: Block
D.
Network: Block HTTP/HTTPS
E.
Endpoint: Notify
F.
Protect: Copy File