You are configuring multifactor authentication (MFA) for a company using a popular authentication application. The security policy requires authenticators to ensure users' identities using a secondary factor that is accessible but doesn't rely solely on the presence of a mobile application. Which MFA method would best meet this requirement?
Hard token
Soft token
Authenticator application
Voice call