A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IP Zone Dest IP Zone Port Action
Any Untrust Any DMZ 80 Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A.
HTTPS
B.
Stateless packet inspection
C.
Intrusion detection system
D.
Application aware firewall