Which two response rule actions should be avoided in Exact Data Matching (EDM) policies?
(Select two.)

A.
Protect: Copy File
B.
Network: Remove HTTP/HTTPS Content
C.
Endpoint: Block
D.
Network: Block HTTP/HTTPS
E.
Endpoint: Notify
F.
Protect: Quarantine File