Which of the following authentication methods can be considered examples of authentication by knowledge? (Choose all that apply.)