A security analyst needs to contain a compromised system with the quickest approach that requires no configuration. Which solution does the analyst utilize?
a. Firewall
b. Antivirus software
c. Intrusion Prevention System
d. Disconnect from the network