A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A.
HTTPS
B.
Stateless packet inspection
C.
Intrusion detection system
D.
Application aware firewall