Paul has been asked to evaluate implementing soft tokens across the enterprise.What exactly are soft tokens?
A.
One-time password generators that reside in software
B.
Synchronous cognitive passwords generated in software
C.
Components that are required in SESAME implementations that provide thesingle-sign on component
D.
The authenticator portion of Kerberos
Explanation:
One-time passwords can be generated in software, instead of requiring a piece of hardware as in a token device. These are referred to as soft tokens and require that the authentication service and application contain the same base secrets, which are used to generate the one-time passwords.