Which three components can be secured using this method?