B does the job without taking the whole company offline. Isolating just the affected segment stops lateral movement and keeps other services up. Pretty sure that's what most incident response playbooks recommend, but let me know if you disagree.
I don't think D is right here, B fits better. Isolating the segment targets just the attack without knocking out the whole network, while D would cause major downtime. Easy trap for people thinking total shutdown is always safest. Pretty sure most IR guidelines go with B, but open to counterpoints.
Official guides and the ISACA review manual stress that having members represent all business functions (so, D) is major for security governance committees. This way, policy actually matches real business needs. Practice tests back this up too. Pretty sure that's what they're looking for here.
Having members from all key business functions is crucial so the committee gets a full picture of org risks and priorities. Info sec should align with business, not just IT. I’ve seen similar questions emphasize cross-functional input over pure technical knowledge. Pretty sure D fits best here, but open to other takes.