Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)