The containment strategy prevents intruders from removing
information assets from the network, and
prevents attackers from using the organization's network as a launch point
for subsequent attacks.
In
a "block" containment strategy, in which the attacker's path into the
environment is disrupted, you should use the most precise strategy
possible, starting with <span>blocking a specific IP address. Correct answer: C
</span>
False!
There are other things you can do like send pictures and etc.