1/225
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the first three steps in the troubleshooting methodology?
Identify the problem, Gather information, Question users.
What is the purpose of duplicating the problem in the troubleshooting process?
To confirm the issue being faced.
What should you consider when establishing a theory of probable cause?
Question the obvious and consider multiple approaches.
What does the 'top-to-bottom' approach in troubleshooting refer to?
Analyzing from application layer down to the physical layer in the OSI model.
What is the next step if the theory of probable cause is confirmed?
Determine next steps to resolve the problem.
What does 'document findings' entail in the troubleshooting process?
Recording outcomes, actions taken, and any lessons learned throughout troubleshooting.
What is one common cable issue that may be encountered?
Incorrect cable type, such as using single mode instead of multimode.
What is signal degradation in the context of network issues?
Loss of signal quality due to factors like crosstalk, interference, or attenuation.
What are the effects of improper termination in network cabling?
Can lead to network connectivity issues or data loss.
What can increasing interface counters indicate?
Potential issues such as CRC errors, runts, giants, or drops.
What does it mean if a port is marked as 'error disabled'?
The port has been disabled due to an error condition.
What is Power over Ethernet (PoE)?
A technology allowing Ethernet cables to deliver power to connected devices.
What troubleshooting issue could arise from a power budget exceeded in PoE?
Powering issues or malfunctioning devices due to insufficient power.
How do network loops impact a network?
They can cause broadcast storms and network slowdowns.
What role does the root bridge play in Spanning Tree Protocol (STP)?
It serves as the primary reference point for the network topology.
What problems can incorrect VLAN assignments cause?
Disruption of traffic flow and communication between devices.
What does 'address pool exhaustion' mean?
Running out of available IP addresses in a DHCP scope.
What is a common indicator of packet loss?
Reduced application performance and potential timeouts.
What does jitter refer to in network performance?
Variation in packet delay which can affect voice and video quality.
What can cause wireless signal degradation?
Interference, channel overlap, or physical obstructions.
What are two types of tools used in troubleshooting network issues?
Software tools (e.g., protocol analyzers) and hardware tools (e.g., cable testers).
What is the purpose of a protocol analyzer?
To analyze network traffic and identify issues at the protocol level.
How can you verify a network's connectivity using command line tools?
Using commands like ping, traceroute, or nslookup.
What is the function of a Wi-Fi analyzer?
To assess wireless network performance and identify issues.
What does 'latency' measure in a network?
The delay before a transfer of data begins following an instruction.
What does 'throughput capacity' refer to?
The maximum amount of data that can be transferred over a network in a given time.
What command would you use to see the MAC address table on a device?
show mac-address-table.
What does 'subnet mask' determine in an IP address?
Defines the network portion and host portion of the IP address.
In terms of bandwidth, what does 'bottlenecking' mean?
A point in the network where the data flow is severely limited.
What can cause a client to disassociate from a wireless network?
Interference, signal loss, or user-initiated action.
What does a signal strength mismatch in transceivers signify?
Potential connectivity issues due to incompatible devices.
What is the main purpose of a cable tester?
To check the integrity and performance of network cabling.
What does 'administratively down' mean for a network interface?
The interface is manually disabled by an administrator.
Why is it important to establish a plan of action during troubleshooting?
To provide a structured approach to resolving the identified issues.
What is required to confirm if symptoms are replicated during troubleshooting?
Duplicate the problem if possible.
What should be done if the troubleshooting theory is not confirmed?
Establish a new theory or escalate the issue.
What does it mean if an IP address is duplicated in a network?
Two devices are configured with the same IP, leading to conflicts.
What is the function of 'show interface' command on a networking device?
To display the status and configuration of network interfaces.
What does a router's 'routing table' contain?
All the routes known to the router and their associated metrics.
How can 'congestion/contention' affect network performance?
It can lead to slowed performance and increased latency.
What is 'dig' used for in troubleshooting?
To query DNS information.
What troubleshooting might be necessary for insufficient wireless coverage?
Evaluating access point placement and possible interference.
What does the term 'channel overlap' refer to in wireless networking?
When multiple access points use the same frequency channels.
What is one potential effect of improper cabling on a network?
Signal degradation leading to connectivity issues.
What is an acceptable way to test the network speed?
Using a speed tester.
How do you identify the root cause of network performance issues?
By analyzing performance metrics and network traffic patterns.
What might 'transposed transmitter and receiver' indicate?
Cabling issues where TX and RX lines are incorrectly connected.
What does the 'ACL' acronym stand for in network troubleshooting?
Access Control List.
Why document the troubleshooting process?
To ensure learning and to maintain a record for future reference.
What are the two types of encryption mentioned in network security?
Data in transit and Data at rest.
What is the role of Public Key Infrastructure (PKI)?
It manages digital certificates and public-key encryption.
What does IAM stand for in network security?
Identity and Access Management.
What is multifactor authentication (MFA)?
A security mechanism that requires two or more verification factors.
What is Remote Authentication Dial-in User Service (RADIUS)?
A networking protocol that provides centralized Authentication, Authorization, and Accounting.
What does LDAP stand for?
Lightweight Directory Access Protocol.
What is the purpose of Security Assertion Markup Language (SAML)?
To enable Single Sign-On (SSO) across different domains.
What is role-based access control (RBAC)?
A method of regulating access to computer or network resources based on the roles of individual users.
Define geofencing in network security.
A security feature that creates virtual boundaries to allow or restrict access based on geographic location.
What type of security does physical security encompass?
Security measures like cameras and locks.
What is a honeypot?
A security resource whose value lies in being probed, attacked, or compromised.
What does CIA triad stand for in security terminology?
Confidentiality, Integrity, and Availability.
What is the purpose of the Payment Card Industry Data Security Standards (PCI DSS)?
To set requirements for organizations that handle cardholder information.
What is Data locality?
Regulatory requirement for data to remain within a specific geographic boundary.
What is a common impact of a Denial-of-Service (DoS) attack?
Service disruption that causes users to be unable to access the network.
What is VLAN hopping?
An attack that allows an attacker to access traffic on a VLAN that they are not authorized to access.
What is Address Resolution Protocol (ARP) poisoning?
A technique used to send false ARP messages over a local area network.
What does DNS poisoning do?
Corrupts the cache of a DNS server to direct users to malicious sites.
What is an evil twin attack?
A rogue Wi-Fi access point that mimics a legitimate one to steal personal information.
What is shoulder surfing?
Gaining information such as passwords by observing someone while they enter it.
What is the role of device hardening?
To secure a device by reducing its surface of vulnerability.
What does NAC stand for?
Network Access Control.
What does port security do in networking?
Controls the access to a port by restricting which devices can connect.
What is MAC filtering?
A security method used to allow or deny network access based on MAC addresses.
What is an Access Control List (ACL)?
A set of rules that controls network traffic and defines which users or systems are granted access.
What does URL filtering do?
Blocks access to specific web addresses as a security measure.
What is the difference between trusted and untrusted zones in a network?
Trusted zones have more security measures in place compared to untrusted zones.
Define screened subnet.
A network segment that is placed between an internal network and an external network to enhance security.
What is social engineering in terms of network security?
Manipulating individuals into divulging confidential information.
What is phishing?
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Explain dumpster diving.
Searching through physical waste to find confidential information.
What is tailgating in the context of security?
Gaining unauthorized access to a restricted area by following someone with authorized access.
What are the potential consequences of a malware infection?
Data breaches, financial loss, and damage to reputation.
What is time-based authentication?
An authentication method that is time-sensitive, often requiring access at specific times.
What is the purpose of least privilege in access control?
To ensure that users have the minimum level of access necessary.
What can be a consequence of rogue devices in a network?
Unauthorized access and potential data breaches.
What is a honeynet?
A network of honeypots used to lure attackers to observe their techniques.
What does BYOD stand for?
Bring Your Own Device.
Describe the purpose of key management in network security.
To manage cryptographic keys for secure communications and data protection.
What is content filtering?
A method to prevent access to unwanted or harmful content on the internet.
What is a distributed denial-of-service (DDoS) attack?
An attack using multiple compromised systems to flood a target with traffic.
What are some examples of deception technologies?
Honeypots and honeynets designed to trap intruders.
What is the significance of audits in network security?
To assess compliance with regulations and identify security vulnerabilities.
What is physical device hardening?
Measures taken to secure physical devices from tampering or unauthorized access.
What is a malware type?
Software designed to disrupt, damage, or gain unauthorized access to systems.
What is the purpose of documentation in network operations?
To create physical and logical diagrams, including rack diagrams, cable maps, and network diagrams.
What are the layers included in network diagrams?
Layer 1, Layer 2, and Layer 3.
What does asset inventory include?
It includes hardware, software, licensing, and warranty support.
What is IP address management (IPAM)?
It is the administration of DNS and DHCP, including the planning and management of IP address space.
What is a service-level agreement (SLA)?
A contract that defines the service provider's expected level of service.
What does life-cycle management cover?
It covers processes like end-of-life (EOL), end-of-support (EOS), and software management.