In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with ____.

a. blocking a port

b. blocking incoming connections

c. blocking a specific ip address

d. blocking a class of service