ABC Corporation has introduced token-based authentication to system administrators due to the risk of
password compromise. The tokens have a set of HMAC counter-based codes and are valid until they are used.
Which of the following types of authentication mechanisms does this statement describe?
A.
TOTP
B.
PAP
C.
CHAP
D.
HOTP