Which two choices are use cases for Distributed Intrusion Detection? (Choose two.)
A. Identify security vulnerabilities in the workloads.
B. Use agentless antivirus with Guest Introspection.
C. Quarantine workloads based on vulnerabilities.
D. Identify risk and reputation of accessed websites.
E. Gain insight about micro-segmentation traffic flows.
A: Identify security vulnerabilities in the workloads
C: Quarantine and increase the security based on the detected vulnerabilities
Pag 455 ICM Manual