Linda, an AWS cloud administrator, used to generate a soft token in her mobile every
time she used to login to AWS cloud console as part of cloud application security
practices.
Which of the following type of Identity access this action refers to?
a. Federated Identity management
b. Token based authentication
c. Single Sign-on/off
d. Multifactor authentication