On cherry-picking and network containment