Ref: Network Time Protocol: Best Practices White Paper – Cisco
“…
NTP Overview
…
The time kept on a machine is a critical resource and it is strongly recommend that you use the security features of NTP to avoid the accidental or malicious setting of incorrect time. The two security features available are an access list-based restriction scheme and an encrypted authentication mechanism.
…”
A. encrypted authentication mechanism
Correct answer.
B. symmetric server passwords
Wrong answer.
C. clock offset authentication
Wrong answer.
D. broadcast association mode
Wrong answer.
E. access list-based restriction scheme
Correct answer.
This section is not available anymore. Please use the main Exam Page.350-401 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
Highly Voted 2 years, 5 months ago[Removed]
Most Recent 6 months, 2 weeks agoCCNPWILL
1 year, 1 month ago[Removed]
1 year, 5 months ago[Removed]
3 years, 6 months ago