Which two protocols are often used for DDoS amplification attacks? (Choose two.)