When monitoring for both intrusion and security events between multiple computers, it is essential
that the computers clocks are synchronize D. Synchronized time allows an administrator to
reconstruct what took place during an attack against multiple computers. Without synchronized
time, it is very difficult to determine exactly when specific events took place, and how events
interlace. What is the name of the service used to synchronize time among multiple computers?
A.
Universal Time Set
B.
Network Time Protocol
C.
SyncTime Service
D.
Time-Sync Protocol