The graphic shown here illustrates how which of the following works:
A.
Rainbow tables
B.
Dictionary attack
C.
One-time password
D.
Strong authentication
Explanation:
C: Different types of one-time passwords are used for authentication. This graphic illustrates a synchronous token device, which synchronizes with the authentication service by using time or a counter as the core piece of the authentication process.