28. Which of the following is used to intercept and examine network traffic based upon protocol?(A) Sniffer(B) NIDS(C) NIPS(D) Proxy