Which two attack vectors are protected by identity and access control? (Choose two.)