your organization uses a web server to host an e-commerce site. because this web server handles financial transactions, you are concerned that it could become a prime target for exploits. you want to implement a network security control that analyzes the contents of each packet going to or from the web server. the security control must be able to identify malicious payloads and block them. what should you do?