Which two of the following are higher-level protocols that rely upon TCP/IP and are susceptible to attacks such as session hijacking? (Choose two.)