Your company security policy states that FTP traffic to web servers is never permitted. Which ACI construct can be used to ensure that FTP traffic is dropped even if a contract that permits FTP is applied to the web server EPG?
A. filter
B. taboo
C. redirect
D. application profile
E. application entity profile