Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)