Which of the following authentication methods would MOST likely prevent an attacker from being able to success
Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?