Which two security features are available when implementing NTP? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AE.
NTP (Network Time Protocol) is a protocol used to synchronize the clocks of network devices. It is used to ensure that devices in a network have the same time and time zone. NTP is also used for security purposes, such as logging and authentication.
When implementing NTP, there are several security features available. The two security features that are available are:
A. Encrypted Authentication Mechanism: NTP uses authentication mechanisms to ensure that the time information is coming from a trusted source. Encrypted authentication mechanisms use a shared secret key between the client and server to verify the authenticity of the NTP packets. The encrypted authentication mechanism provides secure communication between the NTP client and server.
B. Symmetric Server Passwords: Symmetric server passwords are used to authenticate NTP packets between the client and the server. This type of password ensures that the NTP packets are coming from a trusted source. The symmetric server password provides a secure communication channel between the NTP client and server.
C. Clock Offset Authentication: Clock offset authentication is a security feature used to prevent an attacker from manipulating the NTP time synchronization process. The clock offset authentication mechanism checks the offset between the client and server clocks to ensure that the synchronization is within the allowed range. If the offset is outside of the allowed range, the synchronization process is rejected.
D. Broadcast Association Mode: Broadcast association mode is a security feature that allows a device to synchronize its time with a trusted source without having to send requests to the server. In broadcast association mode, the server periodically sends NTP packets to all devices in the network, and the devices automatically synchronize their time with the server.
E. Access List-Based Restriction Scheme: Access list-based restriction scheme is a security feature used to restrict access to NTP servers. This feature allows the network administrator to specify which devices are allowed to synchronize their time with the NTP server. Access list-based restriction scheme provides an additional layer of security by preventing unauthorized access to the NTP server.
In summary, the two security features that are available when implementing NTP are encrypted authentication mechanism and symmetric server passwords. These features provide secure communication channels between the NTP client and server and ensure that the time information is coming from a trusted source.