An organization created a rule in the Application and Device Control policy to block peer-to-peer applications.
What two other protection technologies can block and log such unauthorized application? (Choose two.)
A. Memory Exploit Mitigation
B. Virus and Spyware Protection
C. Custom IPS Signatures
D. Host Integrity
E. Firewall