In which two ways can users and endpoints be classified for TrustSec? (Choose two)