A technician configures a firewall in the following manner in order to allow HTTP traffic.
Source IPZone: Any Untrust
Dest IPZone: Any DMZ
Port: 80
Action: Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall