Which two statements descrive what a Host-based intrusion prevention system can do that a network intrusion prevention system cannot?