Which two countermeasures help reduce the risk of playback attacks? (Choose two.)