Which two attack vectors are protected by Web Security? (Choose two.)