What are two elements of a custom IDP/IPS attack object? (Choose two.)