An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to
particular users at a company. Which of the following can BEST provide this functionality?
A.
Layer 3 managed switch
B.
VPN concentrator
C.
Load balancer
D.
Content filter