Which two attack vectors are protected by Cloud Security? (Choose two.)