Why accurate time matters in networking
Time synchronisation sounds like a minor housekeeping task, but it underpins some of the most critical functions in a network. These are the real-world consequences of clocks being out of sync — and the reason the exam treats NTP as a significant protocol:
| System | What breaks without accurate time |
|---|---|
| Kerberos authentication | Kerberos tickets are time-stamped and expire — if a device's clock is more than 5 minutes off from the domain controller, authentication fails entirely. This is the most tested NTP consequence on Security+. |
| SSL / TLS certificates | Certificates have valid-from and valid-to timestamps. A device with a wrong clock may reject valid certificates as expired or not-yet-valid. |
| Security log correlation | When investigating an incident across multiple devices, log timestamps must align. A 10-minute clock drift makes it impossible to reconstruct the correct sequence of events. |
| Scheduled tasks and cron jobs | Backups, maintenance windows, and automated jobs run at the wrong time — or not at all — if the system clock is wrong. |
| Multi-factor authentication | TOTP-based MFA (like Google Authenticator) generates codes based on the current time. A device out of sync will generate codes that don't match and MFA will fail. |
NTP stratum levels
NTP uses a hierarchical system called stratum levels to describe how far a clock is from a reference time source. Stratum 0 is the most accurate; each level further down introduces a small amount of additional drift.
Lower stratum = more accurate. Stratum 0 is the reference source. Stratum 1 is closest to it. A device at Stratum 3 synchronises from a Stratum 2 server, which synchronises from Stratum 1.
The exam may ask: "An NTP server synchronises directly from an atomic clock. What stratum level is it?" → Stratum 1. Or: "Which stratum level represents the most accurate time source?" → Stratum 0 (the reference clock itself, not on the network).
How NTP synchronisation works
NTP doesn't just set the clock once — it continuously monitors drift and makes small adjustments to keep clocks aligned. The protocol measures the round-trip delay to the time server and accounts for it when calculating the correct local time.
1. Client sends NTP request to server Client records: T1 = time request was sent 2. Server receives request, sends response Server records: T2 = time request was received T3 = time response was sent 3. Client receives response Client records: T4 = time response was received 4. Client calculates offset and delay: Round-trip delay = (T4 - T1) - (T3 - T2) Clock offset = ((T2 - T1) + (T3 - T4)) / 2 5. Client adjusts its clock by the offset Slewing: gradual adjustment for small drifts (normal) Stepping: immediate jump for large differences (> 128ms default)
NTP (Network Time Protocol) — full implementation with drift correction, multiple server polling, and statistical filtering. Used on servers and network infrastructure. Accurate to within milliseconds.
SNTP (Simple NTP) — simplified version that uses a single server without drift correction. Used on embedded devices, IoT, and simple clients where full NTP complexity isn't needed. Less accurate but much lighter weight.
Both use UDP port 123. The exam distinguishes them by use case — SNTP for simple/embedded devices, NTP for infrastructure.
NTP in enterprise networks
In a well-designed enterprise network, NTP follows a hierarchy that mirrors the stratum model. Rather than having every device query a public internet NTP server directly — which wastes bandwidth and creates an external dependency — the network designates internal NTP servers that sync from public sources and serve time to everything internally.
Internet │ ▼ Public NTP servers (Stratum 1 — pool.ntp.org, time.google.com) │ ▼ Internal NTP server (Stratum 2 — domain controller or dedicated server) │ ├── Core switches / routers (Stratum 3) ├── Access layer switches (Stratum 3) ├── Servers (Stratum 3) └── Workstations (Stratum 3-4, via domain)
On Windows domain networks, the Primary Domain Controller (PDC) Emulator is typically the internal NTP authority. All domain-joined machines automatically sync their clocks through the domain hierarchy, which is why Kerberos authentication works reliably — every device on the domain shares the same time source.
NTP security risks
NTP is a trusted but often overlooked attack surface. Three NTP-related attacks appear on Security+:
NTP has a diagnostic command called monlist that returns a list of the last 600 clients that queried the server. An attacker can send a tiny spoofed request (just 8 bytes) to an NTP server with a victim's IP as the source — the server responds with up to 100× more data directed at the victim. This amplification factor makes NTP one of the most effective DDoS reflection vectors.
Mitigation: Disable the monlist command on NTP servers, restrict NTP to known clients via ACLs, deploy NTPv4 with authentication.
An attacker on the network sends fake NTP responses to shift a device's clock. If successful, this can expire or invalidate SSL/TLS certificates, cause Kerberos authentication failures, invalidate log timestamps, or cause time-based one-time passwords (TOTP) to fail.
Mitigation: Use NTPv4 with authentication (NTP authentication uses MD5 or SHA keys to verify server identity), restrict NTP sources to trusted internal servers only.
NTPv4 supports symmetric key authentication — the client and server share a secret key and the server signs its time responses. This prevents an attacker from injecting fake NTP responses because they don't know the key.
On Cisco devices: configured with ntp authenticate and ntp authentication-key commands. The exam may reference this as a hardening step.
Quick reference — NTP facts for the exam
Protocol: NTP (Network Time Protocol) Port: UDP 123 Purpose: Clock synchronisation across network devices Stratum 0: Atomic clock / GPS — reference source, not on network Stratum 1: Primary server — directly connected to Stratum 0 Stratum 2: Syncs from Stratum 1 — typical enterprise NTP server Lower = more accurate | Max usable stratum = 15 Kerberos: Fails if clock skew > 5 minutes — most tested consequence TOTP/MFA: Time-based codes fail if clock is wrong Logs: Cannot correlate events across devices with different times SNTP: Simplified NTP — single server, no drift correction NTP auth: MD5 or SHA key — prevents time spoofing NTP amplification: monlist command abused for DDoS reflection
Exam scenarios
Studying for Network+ or Security+?
The study guides, practice exams, and free resources worth your time.