Your company security policy states that FTP traffic to web servers is never permitted.
Which ACI construct can be used to ensure that FTP traffic is dropped even if a contract
that permits FTP is applied to the web server EPG?
A.
filter
B.
taboo
C.
redirect
D.
application profile
E.
application entity profile