Which two options can be used by a threat actor to determine the role of a server? (Choose two.)