Authentication types

Describe three authentication types and give an example of each.