At work Joans two network engineers are in a passionate debate over the valueof a soft token versus a hard token device. Which of the following best describes aPage 2cess trol-P2.txtsoft token?
A.
Software that creates one-time passwords
B.
Software that creates passwords for users, also called a password generator
C.
A time-based one-time password generating device
D.
A dynamic password versus a static password
Explanation:
One-time passwords can be generated in software, instead of requiring a piece ofhardware as in a token device. These are referred to as soft tokens and require thatthe authentication service and application contain the same base secrets, which areused to generate the one-time passwords.
A