What are the different kinds of authentication techniques

Subject: Business    / Management
Question
What are the different kinds of authentication techniques? Write a discussion post in which you reply to the following prompts:
• Below what types of circumstances are distributed authentication systems preferable to other kinds of authentication systems?
• Envision you have been asked to make a best practices or guideline document for a secure challenge/response scheme. Transcribe a discussion post in which you summarize the data you would include in this document.
• In your belief, is there any reason a company should use basic authentication instead of digest access authentication? Under what conditions would it make sense to use one or the other? Explain.