A security administrator is responsible for deployment of a new two factor authentication solution. The administrator has been informed that the solution will use soft
tokens. Which of the following are valid token password schemes for the two factor solution being deployed? (Select TWO)
A.
CHAP
B.
PAP
C.
NTLMv2
D.
HMAC
E.
Smart card
F.
Time-based