An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?
A. Layer 3 managed switch
B. VPN concentrator
C. Load balancer
D. Content filter