Answer:
C. Penetration test.
Step-by-step explanation:
Based on the scenario being described within the question it can be said that the administrator should perform a penetration test. This is a fake cyber attack that is performed on you own computer system in order to check for any exploitable vulnerabilities that the system may have. This will allow the administrator to figure out to what degree those systems can be used to gain access to the company internet.