A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP).
Which step can an administrator perform to continue using the remote administration tool without detection by SEP?
A. create a Tamper Protect exception for the tool
B. create an Application to Monitor exception for the tool
C. create a Known Risk exception for the tool
D. create a SONAR exception for the tool