Linda, an AWS cloud administrator, used to generate a soft token in her mobile every
time she used to login to AWS cloud console as part of cloud application security practices.
Which of the following type of Identity access this action refers to?
a. Single Sign-on/off
b. Federated Identity management
c. Multifactor authentication
d. Token based authentication