You are planning on implementing a token-based authentication system in your network. The network currently is spread out over four floors of your building. There are plans to add three branch offices. During your research you are analyzing the different types of systems. Which of the following are the two common systems token-based authentication uses?

A.
Challenge/Response
B.
Random-code
C.
Time-based
D.
Challenge/Handshake
E.
Password-Synch