What are two methods used to protect the data center perimeter? (Choose two.)