Which two mechanisms are used to control phishing attacks? (Choose two.)