An organization has implemented a two-step verification process to protect user access to data that is stored in the cloud. Each employee now uses an email address or mobile number to receive a code to access the data.
Which of the following authentication methods did the organization implement?
A . Token key
B . Static code
C . Push notification
D . HOTP
Answer: D