Which two attack vectors are protected by Email Security? (Choose two.)