Question: An IT security specialist is configuring an NTP server for their organization. The specialist is aware of the risks associated with unauthorized time sources and
An IT security specialist is configuring an NTP server for their organization. The specialist is aware of the risks associated with unauthorized time sources and wants to ensure the NTP synchronization data is protected.
Which protocol should the IT security specialist implement to secure the NTP server against these risks?
AHTTPS
BSSH
CTLS
DNTS
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
