What are valid methods of blacklisting a device? (Choose three)