Which two non-Symantec methods for restricting traffic are available to the Incident Response team? (Choose two.)
A. Temporarily disconnect the local network from the internet.
B. Create an Access Control List at the router to deny traffic.
C. Analyze traffic using Wireshark protocol analyzer to identify the source of the infection.
D. Create a DNS sinkhole server to block malicious traffic.
E. Isolate computers so they are NOT compromised by infected computers.