(1) A security interest may be made effective against a third party by more than one method.
(2) When a security interest is made effective against a third party by more than one method, it is treated as being effective against a third party since the earliest of those methods, as long as there was no time when the security interest was not effective against a third party.