Which two of the following might be considered attack surfaces in the network environment? (Choose two.)