Which two attack types can be prevented with the implementation of a Cisco IPS solution? (Choose two.)