In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users? A、Diskless workstations B、Data encryption techniques C、Network monitoring devices D、Authentication systems