During an incident response, your team has detected a compromised system that is a part of the network. Which of the following actions is the BEST initial containment strategy to minimize the spread of an attack while preserving the state of the system for further investigation?
Changing all user passwords immediately
Rebooting the system to remove the attack components
Isolating the affected system from the network
Applying all missing patches to the affected system