Scenario: A Citrix Engineer is planning to set up a XenApp and XenDesktop environment. The requirements for network security are as follows:
Both external and internal HDX connection traffic must be secured with end-to-end encryption.
Attackers must be prevented from intercepting a user session and viewing sensitive data.
Which two implementations should the engineer include in the environment design to accomplish the requirements? (Choose two.)