A malicious user launches an attack on a private network and believes the attack has been successful. However, the target network is not compromised. What security measure is it most likely using?
A.
only a firewall
B.
a demilitarized zone with a firewall
C.
network segmentation
D.
a virtual private network