Which two actions, when taken in combination, will result in an effective network security solution? (Choose two