Which two attack vectors are protected by identity and access control? (Choose two.)
campus and home
voicemail
endpoints
data center
cloud apps
Submit