chubbybunny2040 chubbybunny2040 29-05-2024 Computers and Technology Answered Which 2 actions can Active Threat Response be configured to perform when it detects traffic to a command-and-control server?