Ed wants to ensure that a compromise on his network does not spread to parts of the network with different security levels. What mitigation technique should he use prior to the attack to help with this?
a. Isolation
b. Fragmentation
c. Tiering
d. Segmentation