A cloud-based web proxy is blocking key sites that a business requires for operation. After validation, the sites are legitimate, and access is required for end users to complete their work.
Which of the following is the BEST solution to allow access to the sites?
A. Instruct users to bypass the cloud-based web proxy.
B. Whitelist the URLs.
C. Blacklist the URLs.
D. Create a security group for those users and enforce MFA.