A security analyst needs to contain a compromised system with the quickest approach that requires no configuration. Which solution does the analyst utilize? a. Firewall b. Antivirus software c. Intrusion Prevention System d. Disconnect from the network