A malicious user launches an attack on a private network and believes the attack has been successful. However, the target network is not compromised. What security measure is it most likely using?
 A. 
only a firewall
 B. 
a demilitarized zone with a firewall
 C. 
network segmentation
 D. 
a virtual private network