A new security feature has been requested for an existing web application with the following
requirements:
All requests must be logged to a secure database.
Each request must be time-stamped with the start and completion times.
Each request must contain the IP address of the client that made the request. Which pattern is
most applicable for this new feature?
A.
Strategy
B.
Front Controller
C.
Abstract Factory
D.
Intercepting Filter
E.
Model View Controller