Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)