Which two attack vectors are protected by cloud app security? (Choose two.)