A cybersecurity analyst observes unusual activity in the network logs. The analyst suspects that the anomalies are related to improper time synchronization across network devices. Which of the following concepts should be investigated as a potential root cause for this issue?
Logging levels
Secure access service edge (SASE)
NTP settings
Hardware architecture