Moira has discovered a compromised computer on her organization's network that is communicating with a command and control server. She believes that cutting off the connection to the command and control server may completely destroy the system. Which of the following containment techniques might she choose to use? (Choose two.)
Group of answer choices
A. Removal
B. Renovation
C. Isolation
D. Reverse engineering