Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)