ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC
counter-based codes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?
A.
TOTP
B.
PAP
C.
CHAP
D.
HOTP