A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network devices and servers. The company servers already have been security-hardened and must not have any additional software installed on them. The security policy mandates the use of a secure communication protocol that supports authentication and encryption for managing the servers.
Which two automation tools must be used to meet these requirements? (Choose two.)