Which two threat-defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
A.
proactive threat response
B.
control of data transmission
C.
application security
D.
network containment and control
E.
Anti-X defenses