A security technician wishes to gather and analyze all Web traffic during a particular time period.
Which of the following represents the BEST approach to gathering the required data?
A.
Configure a VPN concentrator to log all traffic destined for ports 80 and 443.
B.
Configure a proxy server to log all traffic destined for ports 80 and 443.
C.
Configure a switch to log all traffic destined for ports 80 and 443.
D.
Configure a NIDS to log all traffic destined for ports 80 and 443.