Answer:
The correct answer is B
Explanation:
Containment is a system of security whereby all form of access on the information technology system (to files, information, networks etc) is controlled through points of entry or access.
By reviewing firewall and Intrusion detection systems (IDS) logs to identify the possible source of the intrusion, the company can truncate access into their network by the hacker.
Cheers!