Answer:
C. Create a DMZ, add necessary hosts.
Explanation:
According to my experience with information technology and cyber-security, I can say that in this situation you can create a DMZ and add the necessary hosts. A DMZ or Demilitarized zone is a network that is used in order to connect the necessary hosts in the network to an untrusted external network like the internet, while at the same time protecting the hosts.