Final answer:
Alice is using the Isolation strategy in cybersecurity, placing the suspect system in a quarantine VLAN to limit its network interaction and contain potential damage.
Step-by-step explanation:
Alice is practicing a cybersecurity containment strategy known as Isolation. This strategy involves placing a potentially compromised system into a quarantine VLAN to limit its interaction with other networked systems. The goal is to contain any damage by preventively segregating the suspect system from the rest of the network to stop the spread of a possible infection or intrusion. In cybersecurity incident response, containment is a crucial phase that secures the network by isolating affected systems while further investigation and remediation efforts take place.