Troubleshooting Network Infrastructure Flashcards

(26 cards)

1
Q

Switching Errors

A

Occur when data packets are misdirected or dropped as they move through a network switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broadcast Storms

A

Happen when there is a layer 2 network loop, which often occurs due to improper configuration of the STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VLAN Mismatch

A

Occurs when two switches connected by a trunk are configured with different VLAN settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Duplex Mismatch

A

Occurs when the two ends of a network link have different duplex settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Routing Errors

A

Typically caused by misconfigurations, incorrect routing tables, or unstable network conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Routing Loops

A

Happen when a packet gets stuck in a continuous cycle between routers without ever reaching its destination. Can be caused by incorrect routing table entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incorrect Subnet Masks

A

Occur when the subnet mask associated with an IP address is not configured correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Route Flapping

A

Occurs when a network route frequently changes state, causing instability in routing tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN and Tunnel Errors

A

Occur when encrypted communication tunnels face disruptions due to misconfigurations, expired credentials, or encryption failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Insecure Routing

A

Occurs when routing protocols or configurations lack proper security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Configuration Drift

A

Gradual and often unnoticed changes in network configurations over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Signature-Based Detection

A

Compares network activity to known threat patterns, but it can miss new or sophisticated attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Behavioral Analysis

A

Looks for deviations from normal network behavior, which can highlight suspicious activity even if no known threat signature is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anomaly Detection

A

Uses machine learning to flag irregular patterns outside predefined baselines, adding protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNSSEC

A

Domain Name System Security Extensions
Secure name resolution by digitally signing DNS data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zone Transfers

A

Replicate DNS databases but can be attacked if misconfigured

17
Q

DNS/Cache Poisoning

A

Attack where false DNS data is injected into a DNS resolver’s cache

18
Q

Sinkholing

A

Defensive technique that redirects malicious traffic to a controlled sinkhole server

19
Q

DNS Zone

A

Portion of the DNS namespace that a specific DNS server or a group of servers manages

20
Q

SPF

A

Sender Policy Framework
Specifies permitted mail servers for a domain to prevent email spoofing
Stored in DNS, specify domains and IP ranges authorized to send emails

21
Q

DKIM

A

Domain Keys Identified Mail
Adds a digital signature to verify email integrity and sender authenticity
Does not fully prevent spoofing, often combined with DMARC

22
Q

DMARC

A

Domain-based Message Authentication, Reporting, and Conformance
Provides email authentication and policy enforcement using SPF and DKIM results (ie if they fail SPF/DKIM, reject, quarantine, or mark as suspicious)

23
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions
Enables encryption and digital signatures in email messages

24
Q

Network Access Control List Issues

A

Arise when incorrectly configured rules allow inappropriate network traffic or block legitimate network traffic

25
Cipher Mismatch
Occurs when the client and server cannot agree on a cipher suite during the TLS handshake, leading to a failed or insecure connection
26
What are some common PKI issues?
Misconfigured CAs Expired or improperly issued certificates Challenges in certificate revocation Improper key management or distribution