Which of the following are the types of secure MAC addresses in port security technology?