What is the best way to mitigate the risk that executable-code exploits will perform malicious acts
such as erasing your hard drive?
A.
assign blocking actions to signatures that are controlled by the State engine
B.
assign deny actions to signatures that are controlled by the Trojan engines
C.
assign the TCP reset action to signatures that are controlled by the Normalizer engine
D.
enable blocking
E.
enable application policy enforcement