NSE5_FCT-7.0 Exam Question 31

Refer to the exhibit.

Based on the Security Fabric automation settings, what action will be taken on compromised endpoints?