The containment strategy prevents intruders from removing
information assets from the network, and
prevents attackers from using the organization's network as a launch point
for subsequent attacks.
In
a "block" containment strategy, in which the attacker's path into the
environment is disrupted, you should use the most precise strategy
possible, starting with blocking a specific IP address. Correct answer: C