Watch this video on YouTube
Which of the following options provides the most accurate description of a counter-based authentication system?