Which of the following should be performed on a regular basis to prevent unauthorized access to a company network? (Choose two.)