Troubleshooting Network Issues Flashcards

Day12_DNS Troubleshooting & Application Services (161 cards)

1
Q

What is a common use for packet sniffers?

A

Common uses include:

  • Establishing a baseline of normal activity
  • Troubleshooting anomalies
  • Identifying malicious activity

Aka Protocol Analyzers

Packet sniffers are used to intercept and log network traffic for security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or false: Packet sniffers can only be used in wired networks.

A

FALSE

Packet sniffers can be used in both wired and wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of packet sniffers?

A

(2) types of packet sniffers are:

  • Software-application
  • Network appliance (hardware)

Network appliances are typically more robust and perform deeper inspections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of information can be obtained from packet sniffers?

A

Packet Sniffers can obtain:

  • Communication between parties
  • Applications exchanging passwords in clear text
  • Websites being visited
  • Traffic classification (voice, video, data)

Packet sniffers can help enhance network security by identifying vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A packet sniffer might be used in which situations?

A

Use a packet sniffer to:

  • Identify weak passwords being used
  • Classify traffic (data, voice, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of port scanning?

A

Port Scanning identifies which ports are open or listening on a network

Port scanning is important for security assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Vanilla Technique in port scanning?

A

A method where one system attempts to connect to all 65,536 ports on a target system

This technique helps determine the overall state of the ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a SYN scan do?

A

SYN scan sends TCP SYN packets to target ports to check if they’re open—without completing the full handshake—making it a fast and stealthy way to discover active services

This method is less detectable by firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a FIN scan used for?

A

A network scanning technique used to identify open or closed ports on a target system by sending TCP packets with only the FIN (Finish) flag set, without completing the standard three-way handshake

A reset flag response indicates the port is closed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an Xmas Scan do?

A

A network scanning technique used to identify open or closed ports on a target system by manipulating specific flags in the TCP header of packets sent to those ports

The name derives from the visual appearance of the packet, where multiple TCP flags—FIN, URG, and PSH—are set simultaneously, resembling a lit-up Christmas Tree | Ports responding with a reset flag are closed, while others are open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an FTP bounce scan?

A

A method that disguises the attacker’s location by sending packets through an open FTP server

This allows the attacker to scan a target without revealing their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a Sweep scan?

A

A Sweep scan identifies which systems are active on the network by sending ping commands

This helps discover potential targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best practice for network security?

A

Best practices include:

  • Using firewalls
  • Hardening or disabling unused ports
  • Keeping systems up to date
  • Installing anti-malware applications

No security approach is 100% effective, but these practices help minimize risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Wi-Fi analyzers used for?

A

Use a Wi-Fi analyzer to scan locations for effective Wi-Fi coverage and detect interference

They can be software or dedicated hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can Wi-Fi analyzers help determine regarding frequency bands?

A

Wi-Fi analyzers help determine:

  • The best frequency band to use (5 GHz vs 2.4 GHz) based on situational parameters
  • Channels to avoid that will overlap with other networks

This helps optimize Wi-Fi performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information can be gathered from a Wi-Fi analyzer after network implementation?

A

After network implementation, Wi-Fi analyzers can gather:

  • Device information, such as the MAC addresses of devices accessing the network

This can help improve security by identifying unauthorized devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of bandwidth speed testing?

A

Bandwidth speed testing is used to ensure reliable network performance, identify bottlenecks, validate SLAs, and optimize infrastructure for business continuity and scalability.

This is necessary when expected bandwidth levels differ from actual performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name a common method for assessing bandwidth.

A

Common method is to use speed testers

Speed testers provide a specific value as a baseline for comparison.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What factors can affect bandwidth?

A

Factors that affect bandwidth include:

  • A wired vs. wireless network
  • Distance from access point
  • Obstacles in the space
  • Quality of wiring
  • Network devices
  • Time of day

Each factor can impact the performance and reliability of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the impact of distance from the access point on wireless networks?

A

Distance affects the number of packets successfully processed

Greater distance can lead to packet loss and re-tries, making the network seem slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the role of ping in bandwidth testing?

A

Ping tests connectivity and measures response times

Ping replies provide a summary of response times and lost packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the expected response time for LAN pings?

A

Usually no more than a few milliseconds

Ideally, there should be no packet loss in a LAN environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the typical download/upload speed ratio provided by many service providers?

A

85/15 split favoring download speeds

This is common for services like video streaming where download speed is prioritized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is iPerf used for?

A

iPerf is used to determine the maximum bandwidth capabilities of TCP and UDP

It operates in a client-server configuration to test communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does **NetFlow** do?
NetFlow captures and analyzes network traffic | A Cisco Proprietary ## Footnote It provides insights into traffic types and volumes within a network.
26
What is the primary difference between **TFTP** and **FTP**?
TFTP uses UDP; FTP uses TCP ## Footnote TFTP is faster but less reliable due to lack of acknowledgments.
27
What is the function of **ipconfig**?
ipconfig **displays** network configuration details ## Footnote It shows IP address, subnet mask, and default gateway information.
28
What command can be used to release and renew a DHCP address?
ipconfig /release | ipconfig /renew ## Footnote This is useful for troubleshooting DHCP configuration issues.
29
What does the command **tracert** do?
**tracert** displays the path a packet takes from **source** to **destination** ## Footnote It reports each router the packet crosses, useful for troubleshooting network paths.
30
What does **pathping** combine?
**pathping** combines: * Connectivity diagnostics of a **ping** * Routing information of **tracert** ## Footnote It provides statistical information about the route a packet takes.
31
What is the purpose of the **nslookup** command?
**nslookup** diagnoses **DNS issues** with queries, and answering queries by returning IP addresses or host names on a Windows system ## Footnote It can perform standard name to address resolutions and verify DNS server responses.
32
What does the **arp** command do?
**arp** displays and manages ARP cache information ## Footnote It resolves IP addresses to MAC addresses and can add or remove cache entries.
33
How long do **dynamic ARP entries** remain in the cache by default?
Two minutes ## Footnote This is the time before they are purged unless they are static entries.
34
What does the **netstat** command display?
**netstat** command displays: * Routing tables * Status of network connections * Statistical information about network interfaces ## Footnote It helps in checking incoming and outgoing connections.
35
What is the function of the **route** command?
the **route** *cmd* **manually** configures a router's routing table ## Footnote It can add, delete, or change static routing entries.
36
What utility is used in Linux to manage local network interfaces?
**ifconfig** ## Footnote The Linux-equivalent to the Windows ipconfig utility
37
What does **tcpdump** do?
**tcpdump** captures and filters TCP/IP packets ## Footnote It can save captures in PCAP format for future analysis.
38
What is the purpose of **iptables**?
**iptables** purpose is to manages **tables** of IPv4 packet filter rules ## Footnote It allows for basic firewalling and rule management.
39
What is **Nmap** used for?
**nmap** is used for: * Auditing * Monitoring * Security exploration ## Footnote It provides an overview of the network environment and identifies vulnerabilities.
40
What does the **dig** command do?
***dig*** command queries DNS nameservers for host addresses in **Linux** ## Footnote It helps find out which servers are performing specific roles.
41
What are the **common issues** encountered with **wireless connectivity**?
Common issues include: * Speed limitations * Distance limitations * Interference from other devices * Interference from walls and materials ## Footnote Wireless signals can only travel so far, and various factors can impact performance.
42
Which frequency band is better for **distance** and penetrating obstacles: **2.4 GHz** or **5 GHz**?
2.4 GHz ## Footnote 2.4 GHz can travel farther but is slower, while 5 GHz is faster and less prone to interference.
43
What is the impact of **router positioning** on wireless performance?
Router positioning is key: * A central location is ideal * You want to avoid obstructions like concrete walls * Repositioning (if possible) can improve connectivity ## Footnote Many users place routers in basements or garages, leading to weak signals in distant areas.
44
True or false: **Distance problems** are indicated by an inability to connect to the device.
TRUE ## Footnote Distance issues can lead to intermittent connectivity, while speed issues may also relate to interference.
45
What does **RSSI** stand for and what does it measure?
**Received Signal Strength Indicator** (RSSI) ## Footnote RSSI measures the power level of a received radio signal at a client device, indicating how well the device can detect and receive signals from a WAP, router, or other transmitter
46
What does **EIRP** stand for and what does it indicate?
**Effective Isotropic Radiated Power** (EIRP) ## Footnote EIRP measures antenna power and signal strength from its point of origin
47
What are the effects of **reflection** and **absorption** on Wi-Fi signals?
* **Reflection** can cause *interference* * **Absorption** leads to *signal strength loss* ## Footnote Different materials absorb signals differently, e.g., concrete absorbs more than wood.
48
What types of **antennas** are commonly used in wireless implementations?
(2) common types are: * **Directional** antenna * **Omnidirectional** antenna ## Footnote Directional antennas focus coverage in a specific area, while omnidirectional antennas provide 360-degree coverage.
49
What is a **hidden node** in wireless networking?
A **hidden node** happens when (2) clients connect to the same access point **but** they're unable to detect each other ## Footnote This can lead to packet collisions and degraded network performance.
50
In the **2.4 GHz band**, which channels are recommended to avoid overlap?
Recommended channels are: * Channel **1** * Channel **6** * Channel **11** ## Footnote These channels are spaced far enough apart to avoid interference.
51
What is the most common **antenna polarization** configuration for Wi-Fi?
**Vertical** is the most common antenna polarization ## Footnote Vertical antennas produce the best signals for horizontal propagation.
52
What happens to devices that connect to multiple **wireless networks** over time?
After multiple networks over time: * Devices may forget unused networks * Manual reconnection may be needed ## Footnote Devices can only remember a limited number of networks.
53
What is the purpose of a **Wireless Site Survey**?
Its purpose is to determine overall transmission characteristics and identify areas of poor quality service or high levels of interference ## Footnote A site survey can use software-based analyzers and/or hardware-based spectrum analyzers.
54
Name common **wireless connectivity issues**.
Common wireless issues include: * Signal loss * Wrong SSID * Interference * Coverage problems * Captive portal issues * Incorrect passphrase * Encryption protocol mismatch ## Footnote These issues can affect the performance and reliability of wireless networks.
55
True or false: **Interference** refers to other transmissions that are within range of your client devices or access points.
TRUE ## Footnote Interference can occur when multiple devices operate on the same frequency or channel.
56
What are the two frequency bands that **dual-band routers** can operate on?
* 2.4 GHz * 5 GHz ## Footnote Switching to a different band can alleviate interference issues.
57
What does **crosstalk** refer to in wired networking?
**Crosstalk** happens when signal from one wire is picked up on another wire ## Footnote This can cause interference issues, especially if wires are damaged or too close together.
58
What are the two types of **duplex** in network communications?
(2) types of duplex are: * Half duplex * Full duplex ## Footnote **Full duplex** allows simultaneous sending and receiving of data at the same time | **Half duplex** is one-at-a-time communication
59
What is the **native VLAN** on most switches by default?
***VLAN 1*** ## Footnote The native VLAN is used for untagged traffic on trunk links | **The** native VLAN configuration must be consistent across all switches on the trunk for communication
60
What can cause **bad ports** on a switch?
Causes include: * Incorrect cable insertion * Bad power fed to the device * Debris caught between a connector and contacts ## Footnote A bad port can lead to dropped packets or loss of connectivity
61
What should you do if a **bad port** is identified?
* Label it physically * Disable it in the software * Document its previous use ## Footnote This helps prevent future use and provides context for troubleshooting.
62
What are **Port roles**?
**Port roles** refer to the *logical function or behavior* a port plays in managing traffic between devices or applications. These roles help **organize**, **secure**, and **route** data efficiently across networks ## Footnote Think of it as a “door” through which data enters or exits a system
63
What are the results of incorrect configuration changes to network interfaces?
* Poor throughput * Inconsistent connectivity * Total loss of connectivity ## Footnote Documenting changes can help in troubleshooting if issues arise.
64
What is a **bottleneck** in a network?
**Bottleneck** occurs in any part of a network where *traffic builds up faster* than it can be processed ## Footnote Commonly caused by devices lacking sufficient resources.
65
What are common reasons for **bottlenecks**?
Common bottleneck reasons: * Insufficient server resources * High user access on servers * Outdated internetworking devices ## Footnote Servers need robust configurations to handle multiple users effectively.
66
What is the purpose of a **default gateway**?
**Default gateway** allows hosts to communicate with external networks ## Footnote The default gateway is typically a router.
67
What should you check if you cannot reach the **default gateway**?
Check: * Local IP configuration (**ipconfig** cmds & **Ping**) * Physical cabling ## Footnote Isolate the problem like any other connectivity issue.
68
True or false: A **damaged cable** can cause connectivity issues.
TRUE ## Footnote A damaged cable can lead to slow or intermittent connections.
69
What should you do if you suspect a **damaged cable**?
* Check for visible damage * Use cable testing tools * Replace with a known good cable ## Footnote Always start with the most obvious solutions when troubleshooting.
70
What is a **subnet mask**?
A **32-bit** value used to divide an IP address into ***network** ID* and ***host** ID* ## Footnote It determines how many hosts can reside on a network.
71
What is the **most common issue** with an incorrectly configured subnet mask?
It can make a system appear to be in the wrong network, preventing communication ## Footnote Ensuring correct configuration is critical for network communication.
72
In binary, what does a **value of 255** represent in a subnet mask?
**All eight bits** in an octet are set to **1** ## Footnote Each bit represents a value: 128, 64, 32, 16, 8, 4, 2, 1.
73
What are the **default subnet masks** for class A, B, and C networks?
* Class **A**: 255.0.0.0 * Class **B**: 255.255.0.0 * Class **C**: 255.255.255.0 ## Footnote These masks define the size and number of hosts for each class.
74
True or false: A **subnet mask** can determine if two host systems are on the same network.
TRUE ## Footnote It compares IP addresses bit by bit
75
What happens if two hosts are in **different networks**?
If (2) hosts are in different networks, the packet is forwarded to the **default gateway** ## Footnote This indicates they cannot communicate directly.
76
What is the **broadcast address** of a network?
The address where all hosts can receive packets, typically ending in 255 ## Footnote For example, 192.168.1.**255**
77
What command line utility can show your **current network configuration** including the subnet mask?
***ipconfig*** ## Footnote ipconfig displays and manages the IP address and other network configuration settings of a computer; including subnet mask, as well as DNS information
78
What issue can arise from **duplicate IP addresses** in a network?
**Duplicate IP addresses** can cause connectivity issues and/or interfaces to become disabled ## Footnote This often results from manual configuration errors.
79
What should be ensured when using **static IP addresses**?
When using static IP addresses *consider*: * The static IP must be ***outside*** the range of IP addresses assigned by the DHCP server to **prevent conflicts** | Ensure the static IP is within the **same subnet** as other devices on the network
80
Fill in the blank: A **DHCP scope** must exclude any values that have already been _______.
statically assigned ## Footnote This prevents conflicts in IP address assignments.
81
What is a potential problem when a system comes back online after being offline?
The system's **previous IP** address may have been given to another node or system ## Footnote This can lead to duplicate IP address issues.
82
What does the term **scope** refer to in DHCP?
The valid range of IP addresses **available to be leased** to client devices ## Footnote The scope can also specify subnet masks, default gateways, and other server configurations.
83
What is a **lease** in the context of DHCP?
The ***temporary*** assignment of an IP address to a client device ## Footnote Leases expire after a specified duration, requiring clients to request new configurations.
84
What is the purpose of **reservations** in a DHCP scope?
To **allocate a specific IP address** to a particular client system ## Footnote Reservations require the MAC address of the target system to ensure uniqueness.
85
What happens if a DHCP **scope** is not activated?
**No** address configurations will be allocated to clients ## Footnote Activation is necessary for the scope to begin leasing IP addresses.
86
What is a **rogue DHCP server**?
An **unauthorized** DHCP server on a network ## Footnote Rogue servers can provide incorrect IP configurations, potentially redirecting clients to malicious services.
87
What is the recommended configuration for DNS servers in a network?
Recommonded configuration is to have at least **one primary** and **one secondary** DNS server ## Footnote This setup ensures continuity of service if the primary server fails.
88
What utility can be used to troubleshoot DNS issues on a **Windows** system?
***nslookup*** ## Footnote nslookup helps test the name resolution process and query specific DNS servers.
89
What should you do if you suspect a **DNS issue**?
**Ping** the DNS server to verify its status ## Footnote If the server is reachable but name resolution fails, the issue lies with the DNS service.
90
What does **DNS poisoning** refer to?
**DNS poisoning attack**, a fake IP address replaces the valid IP address for a server or other device ## Footnote This can redirect clients to malicious websites or services.
91
What is the purpose of **DHCP snooping**?
Its purpose is to prevent **rogue DHCP servers** by allowing DHCP offers only from **authorized** ports ## Footnote This feature enhances network security against unauthorized DHCP configurations.
92
What command can be used to confirm the IP address of the DHCP server that assigned a configuration?
ipconfig /all ## Footnote This command displays the DHCP server's IP address used by the client device.
93
Which **Linux utility** would be the best option to use to help **troubleshoot issues with the DNS service**?
***dig*** utility
94
True or false: A **static IP address** can change automatically.
FALSE ## Footnote Static addresses remain the same until manually changed, providing stability in network configurations.
95
What is a **MAC address**?
A **physical hardware address** assigned to a network interface ## Footnote MAC addresses are globally unique and consist of 12 hexadecimal characters.
96
How can you view the **ARP cache** on a Windows system?
By using the command **arp -a** ## Footnote This command lists the IP addresses and their corresponding MAC addresses of recently communicated systems.
97
What is the purpose of **Intrusion Detection Systems** in relation to DHCP packets?
IDS helps in identifying **unauthorized DHCP traffic**, as well as alert the network admin
98
In a **Windows Active Directory environment**, what is a requirement for DHCP servers?
DHCP servers must be **authorized** by an administrator ## Footnote Unauthorized DHCP servers will not issue address configurations.
99
Why is **DHCP** considered a necessary service in large networks?
DHCP **automates** the process of assigning IP addresses. ## Footnote Manual configuration of client devices is impractical in large networks
100
True or false: A shorter lease period is beneficial in environments with many temporary users.
TRUE ## Footnote This allows for quicker availability of IP addresses.
101
What is the **Network Time Protocol** used for?
**NTP** synchronizes the clocks of computer systems over packet-switched networks, ensuring they are aligned with the Coordinated Universal Time (UTC) ## Footnote This ensures accurate timekeeping across devices.
102
What can cause issues with **time synchronization** in a network?
**Inaccurate** computer clocks causes issues with time synchronization ## Footnote This can affect logging, managing, and securing systems.
103
What is the consequence of a client system being outside the **time tolerance** in a Microsoft Active Directory environment?
Being outside the time tolerance inhibits users from joining the Active Directory domain; in addition to possible login issues ## Footnote Time discrepancies can lead to various synchronization issues.
104
When does a DHCP client typically request a lease renewal?
At 50% of the lease duration ## Footnote If the client is offline, it will try again at 87.5% of the lease duration.
105
What is a potential security benefit of having **fewer available IP addresses**?
This **reduces the risk** of unauthorized devices obtaining an IP configuration.
106
What does **SSL** stand for?
Secure Sockets Layer ## Footnote SSL is a standard security protocol that protects information **in transit** by providing **encrypted** communications.
107
What is the primary function of **SSL**?
Protects information **in transit** through encrypted communications ## Footnote Commonly used between web servers and browsers for online banking and shopping.
108
What issue can arise with **SSL certificates** related to server names?
The issue of a ***name mismatch*** can arise. This occurs when the **server name** and the **name on its certificate** do not match.
109
List some common problems that can occur with **SSL certificates**.
Problems include: * Installation problems * Expired validity period * Certificates mistakenly deleted * Incorrect type of certificate installed * Problems contacting the issuing trusted root certificate authority ## Footnote These issues can lead to invalid or untrusted certificates.
110
What tool can be used to check for problems with publicly accessible web servers regarding **SSL certificates**?
SSL Labs ## Footnote This application helps investigate issues pertaining to certificate verification.
111
What is the purpose of **Wireshark** in SSL troubleshooting?
Wireshark analyzes and troubleshoots SSL/TLS connections by **capturing, filtering, and examining network traffic** to diagnose issues in secure communication ## Footnote It helps in identifying where errors might be occurring during the connection.
112
What does **OpenSSL** do in the context of SSL?
**OpenSSL** *captures* and *debugs* commands during connection negotiation ## Footnote Useful for determining errors in SSL connections.
113
True or false: Modern browsers are effective at detecting issues with **SSL certificates**.
TRUE ## Footnote Browsers will notify users of any problems with the server's certificate.
114
What visual indicator can you look for in a browser to check the **SSL certificate**?
A padlock or small certificate icon ## Footnote Clicking on it reveals the details of the server certificate.
115
What is **TLS**?
**Transport Layer Security** a cryptographic protocol designed to provide secure communications over a computer network, such as the Internet ## Footnote It is the **successor** to the **SSL protocol**, and is now the standard for securing web traffic, most notably through HTTPS
116
What is a common port used for secure web transactions over **SSL**?
Port **443** is **HTTPS**; typically uses TCP
117
What is the role of a **firewall**?
It **blocks unauthorized** connections and allows authorized ones ## Footnote Misconfiguration can lead to loss of connectivity or security vulnerabilities.
118
What should you verify first when troubleshooting a hardware-based **firewall** issue?
Check the physical cabling and connectivity
119
What can **ACL misconfigurations** lead to?
Issues include: * Prevent legitimate access * Fail to prevent unauthorized access ## Footnote Regular reviews of ACL configurations are necessary to maintain security.
120
What is a common symptom of a **hardware failure** in network devices?
A common symptom of hardware failure in network devices is **intermittent connectivity or complete network failure**, often caused by loose, damaged, or improperly routed cables ## Footnote Additionally, hardware issues can arise from needing a configuration change as well. Antiquated hardware may not function correctly until it's been updated and/or replaced with a newer device.
121
What should you check if a **service** on a Windows server is unresponsive?
Event Viewer Logs ## Footnote Logs can indicate if a service stopped unexpectedly.
122
What are the four states a **service** can be configured in on a Windows server?
A service can be configured in the following ***4 states*** * Manual * Disabled * Automatic * Automatic (delayed) ## Footnote These states determine how and when services start.
123
What is the purpose of the **services console** in Windows?
***Services Console*** purpose is to provide a GUI for managing, configuring, and interacting with services.
124
What is a **common service** on a Windows server that supports email functionality?
**Active Directory Service** ## Footnote This service is essential for domain controllers.
125
What is an **application log**?
**Application log** records activities of a service running for a specific application ## Footnote Application logs help in troubleshooting errors with **unresponsive services.**
126
What do **system logs** record?
***Systems logs*** record activities of services present in the Operating System ## Footnote System logs support devices or hardware.
127
What should you do if a service has been **stopped**?
**Restart** the service ## Footnote This can avoid a full reboot which may disrupt other functioning services.
128
What is a **broadcast storm**?
When a system sends broadcasts **continously** ## Footnote It can be identified through packet capturing.
129
What does **multicast flooding** refer to?
Multicast flooding refers to the flooding of traffic due to **unknown MAC addresses** in switches ## Footnote It occurs when a switch encounters a MAC address it **has not** discovered.
130
What can cause **asymmetric routing problems**?
Typically caused by *mismatched network paths, dynamic routing decisions, or misconfigured policies* that lead to traffic taking different routes in each direction ## Footnote Packets depart on one path and return on another.
131
What is **DHCP scope exhaustion**?
Exhaustion means there's **not enough** IP addresses in the DHCP scope ## Footnote Reconfiguring lease duration or creating new scopes can help.
132
What does a **missing route** indicate?
A missing route indicates a router ***does not know*** how to locate a destination network ## Footnote It often produces a **Destination host unreachable** error.
133
What common issues can arise with **SSL certificates**?
Common issues include: * Expiry * Chain errors * Name mismatches * Incorrect certificate type ## Footnote Issuing a new certificate typically resolves these issues.
134
What can cause an **incorrect VLAN assignment**?
Possible causes of incorrect VLAN assignment: * user may have physically moved to a new location * system may have been re-configured with a new network adapter ## Footnote Proper documentation of VLAN arrangements can help alleviate these problems.
135
What characteristic of a Wi-Fi analyzer would ***not*** be effective in a wireless network implementation?
A Wi-Fi analyzer would ***not*** be effective in determining the appropriate security settings to use in a wireless network implementation ## Footnote Wi-Fi analyzers ***do not*** provide guidance on configuring security protocols like WPA3, or recommend specific password policies
136
In a wireless network, which factor would likely have the most noticeable effect on the available bandwidth of a connection?
Distance
137
When troubleshooting the configuration of a firewall, which values would you expect to see configured for any entries in the ACL?
***Expect to see***: * The zone value * Source & destination IP address * Interface on which a rule is placed
138
Effective Isotropic Radiated Power refers to which characteristic of wireless transmission?
The ***strength*** of a transmission emanating from the antenna
139
If you discover that a service has become unresponsive, and its state is set to automatic, by which methods could the service be reset?
* Restart the service with the **Services** utility ## Footnote As a last resort reboot the server. This is a last resort because rebooting a server can cause unnecessary downtime
140
If the certificate on a server seems to be intact, but the server that issued the certificate in the first place cannot be verified, how would this error be classified?
Classified as ***Missing chain certificate***
141
If your IP address does not include a value for the default gateway, but your address and netmask (subnet) are correct, which connectivity scenarios will occur?
Connectivity scenarios include: * You will **only** be able to connect to systems in the same network * You **will not** be able to connect to the internet
142
A scenario whereby packets are leaving your network through one route, indicates which type of issue?
**Asymmetric routing**
143
Which implementation can be configured on your switches to prevent the implementation of a rogue DHCP server?
**DHCP snooping**
144
Which port scanning technique attempts to fool a target system into believing the communications have been occurring by sending an indication that the conversation has ended?
**FIN scan**
145
If the DHCP scope being used for guest access in the lobby of a hotel is continually running out of IP addresses, what is the most likely cause?
The **IP lease** duration is too long
146
How often are there **MAC Address** conflicts on a network?
Not very often, incredibly rare
147
If you plug an ethernet cable into the network adapter of your computer and the LED status light does not activate, what is the most likely cause?
A damaged cable
148
Which utility would be the best option to use when trying to determine the maximum bandwidth specifications of applications using either the TCP or UDP transport protocol?
**iperf**
149
Installing an antenna in a vertical or upright position as opposed to a horizontal position is an implementation of which characteristic of wireless transmissions?
Polarization
150
What is an Attack Vector?
The **path** or **means** by which a threat actor gains unauthorized access to a system
151
What is a Threat Actor?
An entity (person, group, or automated process) that performs **malicious activity** against digital assets
152
What is an Exploit?
A method or piece of code that **takes advantage** of a vulnerability; the action taken
153
What does Payload mean?
The part of an attack that **carries out the harmful action** (malware, code, command)
154
What are "Drops" in the context of troubleshooting port interface issues?
**Drops** refer to packets that are **discarded** by the interface *before* they can be processed or forwarded. ## Footnote These drops can occur on either the receive (RX) or transmit (TX) side and often signal ***performance or configuration issues***
155
What is **Link Layer Discovery Protocol** (LLDP)?
**LLDP** a *vendor-neutral* Layer 2 protocol used by network devices to **advertise their identity**, **capabilities**, and **neighbors** on a local network ## Footnote It’s standardized under IEEE **802.1AB** and is widely used for network topology discovery and troubleshooting.
156
What is **Cisco Discovery Protocol** (CDP)
**CDP** a *vendor-specific* Layer 2 **Cisco** proprietary protocol used by devices to advertise and discover directly connected neighbors.
157
What is a Speed Tester?
**Speed tester** a tool that measures the performance of your internet connection, specifically your **download speed**, **upload speed**, **ping** (latency), and sometimes **jitter**. ## Footnote It's used to verify if you're getting the bandwidth your ISP promised, and to troubleshoot slow or unstable connections.
158
What does "**Error Disabled**" mean in the context of port status?
It means a switch port has been **automatically shut down** due to a detected fault or violation. No traffic can pass through until it's manually or automatically recovered ## Footnote Ports enter err-disabled when the system detects a serious issue (e.g., link flapping, duplex mismatch, loopback error, unicast flooding, etc.)
159
What does “**Administratively Down**” mean in the context of port status?
It means the port has been **manually disabled by a network administrator** through configuration. It is not due to a fault or error—it’s an intentional shutdown ## Footnote The interface is disabled at the **software level**, and no traffic can pass through it until it’s re-enabled
160
What does “**Suspended**” mean in the context of port status?
It typically means the **port is part of a port channel** (EtherChannel), but has been temporarily disabled due to a **configuration mismatch** or **protocol failure**—especially with LACP ## Footnote When a port is in a Suspended state, it’s not passing traffic even though it’s physically connected. This usually happens in link aggregation setups (like EtherChannel or LACP)
161
What are some basic **switch interface commands**?