Using a pre-printed list of bypass codes for two-factor authentication uses which of the following methods?
1) Biometric authentication
2) SMS authentication
3) Hardware token authentication
4) Software token authentication