5.0 Network Trouble Shooting Flashcards
You need to increase the area that is covered by your wireless network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT:
A) repeaters
B) channel bonding
C) reflectors
D) encryption
Encryption cannot increase the area covered by your wireless network. Encryption is a security feature that protects data that is transmitted over the wireless network. Encryption when used on a wireless network can be used to prevent messages from being intercepted and read. However, you must ensure that the encryption methods used are compatible. Incompatible encryption methods would cause communication between the wireless networks or between the wireless and wired networks.
Repeaters, reflectors, and channel bonding can increase the area covered by your wireless network by using a signal bounce. Repeaters and reflectors simply bounce the signal. Channel bonding is an 802.11n implementation that increases the bandwidth by combining two adjacent 20-MHz bands.
Keep in mind that wireless switch or access placement is also important. Often just relocating an access point can alter the covered area enough to include the new location. Another factor is the signal strength. Signal strength can be adjusted based on your organization’s needs. Signal strength is also referred to as power level. Remember that using signal bounce can make the signal strength at a device appear as a strong signal with the user still experiencing consistent drops issues.
What happens when wireless access point is at full capacity with devices?
Device saturation − Some wireless networks support a maximum number of devices. Once device saturation occurs, no other devices will be able to join the network. You will need to deploy another wireless access point, upgrade the current access point to support more devices, or replace the current access point with one that will support more devices.
What occurs when there is too many devices that surpasses the maximum bandwidth of a Wireless Access Point?
Bandwidth saturation − Wireless networks have a maximum bandwidth available. If too many devices connect to the wireless network and have high bandwidth requirements, bandwidth saturation can occur. If this occurs, you should determine which devices are requiring the most bandwidth and move them to another network. You could also deploy another wireless network with a higher bandwidth maximum.
What should you do when you update a wireless device?
Untested updates − Any updates to wireless network devices should be thoroughly tested before deployment on the network. This includes any firmware updates.
Why should you avoid open wireless networks?
Open networks − Open networks are commonly deployed in public areas, such as libraries, coffee shops, and retail establishments, to provide a service to customers. However, you should use extreme caution when using open, unsecured networks as any communication can be intercepted and read. Companies should adopt a policy that clearly states whether personnel can connect to open networks using company-issued devices, including laptops, cell phones, and other mobile devices.
What protocol should you follow when there is incompatibility?
Incompatibilities − Incompatibilities usually occur when you deploy a device, update, or application that is incompatible with the clients on your wireless network. It may be necessary to roll back the update, remove the application, or reconfigure the device. If you deploy devices, updates, or applications in a testing environment first, you should be able to discover these issues before live deployment.
What standard is MIMO uses on the IEEE?
Multiple in, multiple out (MIMO) − MIMO is deployed in 802.11n wireless networks. It uses separate antennas for outgoing and incoming transmissions. MIMO increases reliability and throughput.
What happens when there is RF Attenuation?
Radio Frequency (RF) Attenuation – RF attenuation is when RF or light waves have their signal strength weakened. This attenuation happens naturally as the signals pass through walls, bodies, windows, and similar surroundings. While this has become less of a problem with modern Wi-Fi networks, IT teams should keep this issue in mind when designing a network.
What happens when you use the wrong Encryption Protocol?
Encryption Protocol Mismatch – An encryption protocol mismatch occurs when a user uses a security key to unlock an encryption protocol, but that key does not work with the designated protocol. Protocol key management can be a cumbersome process, especially with networks that utilize several encrypting protocols. Implementing a key manager can be one way to ensure these mismatches do not occur often.
What do you do when you have a Captive portal Issues?
Captive Portal Issues – A captive portal is a web page that is accessed by a web browser to help authenticate and authorize users when they are first connecting to a network. However, this portal can have issues occur with authentication, redirection, broken rules, and other similar issues. Whenever implementing a captive portal, it is critical to test the portal to ensure that it is functioning properly and preventing unauthorized parties from entering the network.
What happens when Client Disassociation Issues arise?
Client Disassociation Issues – Disassociation occurs when a user is removed or disconnected from a network either from being forcibly removed or by a network error occurring. Disassociation can be disruptive to workflow as well as be an indicator of a potential attack taking place, such as an Evil Twin attack.
What are the AP Configurations?
Lightweight Access Point Protocol (LWAPP) − LWAPP is a protocol that allows a wireless LAN controller (WAC) to manage and control multiple wireless access points.
Control And Provisioning of Wireless Access Points (CAPWAP) is a newer alternative to LWAPP.
Thin vs thick − Thick access points handle a wide array of tasks in software, each a separate IP address wired directly into Ethernet switches, If WLAN controller is deployed, the access points no longer have to handle as many tasks because they can be handed off to the WLAN controller. When a WLAN controller is used, the APs are referred to as thin APs.
AP association time – Whenever connection to an access point within a network there are several steps that should take place. This process begins by a device requesting access, to which the AP going through the process to authenticate the user. After the user verifies their identity, then the user must make an association request to the AP. After receiving the association request, the AP will then create an Association ID for the device and give them access to the network. This entire process refers to how long the AP association time takes. Fast association times will enable users to connect faster and be more productive rather than having to wait for unspecified times for the AP to respond. Attackers can try to target these APs by flooding them with fake access requests to attempt to cause a denial-of-service attack, which will subsequently slow down workflow production.
You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company’s network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do?
A) Re-route the network cable.
B) Reinstall the network adapter.
C) Replace the network adapter.
D) Replace the network cable.
You should replace the network cable. As stated in the scenario, the TDR shows that signal returns too early, which implies that there is a breakage in the network cable. Therefore, you should replace the cable to fix the problem.
You should not reinstall the network adapter. The TDR shows that the signal returns too early which implies that there is a breakage in the network cable. Reinstalling the network adapter will not fix the problem. You should only reinstall the network adapter if you discover an issue with the adapter’s driver.
You should not replace the network adapter. This is required if Device Manager cannot detect a network adapter plugged in the computer or if the network adapter is faulty.
You should not re-route the network cable. This would be a problem if interference were occurring. Re-routing cable further from the interference source usually can fix the problem. Cables can also be enclosed in a protective shield to prevent interference. It is also necessary to re-route a network cable if it lies across the floor. Routing network cable across the floor can cause tripping hazards and can result in cable breakage from the constant pressure of being walked on.
A hacker has used a packet sniffer to attack your company’s network. What can a hacker accomplish by using this technique?
A) initiating a social engineering attack
B) spreading a virus on a network
C) collecting data on network traffic
D) inserting a Trojan horse on a network server
A packet sniffer is a device that can be used to collect traffic data on network media, even if the traffic is not addressed to that device. A packet sniffer is also called a network analyzer, network sniffer, or protocol analyzer. Many packet sniffers can provide in-depth traffic analysis for your network. An attacker can use a packet sniffer to defeat a MAC address filter. A packet sniffer is a type of network analyzer.
A hacker can initiate a social engineering attack by using several methods, such as instant messaging, a telephone call, or an in-person visit to a company. A virus can be spread through several methods, such as infected storage media or infected e-mail messages. A hacker can use e-mail or another transmission method to insert a Trojan horse on a network server.
Your organization has responded to a security incident. The breach has been contained, and all systems have been recovered. What should you do last as part of the incident response?
A) investigation
B) post-mortem review
C) analysis
D) triage
A post-mortem review should be completed last as part of the incident response. The post-mortem review should be performed within the first week of completing the investigation of the intrusion. Triage is part of the first step in an incident response. During this step, the incident response team examines the incident to see what was affected and sets priorities. Investigation takes place after the triage. It involved the collection of relevant data. After the investigation stage, the incident response team is responsible for the containment stage. After the incident is contained, the next stage is analysis, where the root cause of the incident is discovered.
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - First step:
- Identify the problem.
What does this entail?
a. Identify the problem.
b. Gather information.
c. Question users.
d. Identify symptoms.
e. Determine if anything has changed.
f. Duplicate the problem, if possible.
g. Approach multiple problems individually.
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - Second step:
- Establish a Theory
What does this entail?
a. Question the obvious.
b. Consider multiple approaches.
-Top-to-bottom/bottom-to-top OSI model
- Divide and conquer
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - Third Step:
3.Test the theory to determine cause.
What does this entail?
a. If the theory is confirmed, determine next steps to resolve the problem.
b. If the theory is not confirmed, re-establish new theory or escalate.
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 4th step?
Establish a plan of action to resolve the problem and identify potential effects,
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 5th step?
Implement the solution or escalate as necessary,
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 6th step?
Verify full system functionality and, if applicable, implement preventive measures.
The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 7th step?
Document findings, actions, outcomes, and lessons learned.
You need to create a cable that will allow you to get a link light on your network interface card (NIC) when the NIC is not plugged into a hub or switch. Which type of cable should you use?
A) crossover cable
B) rollover cable
C) loopback cable
D) straight-through cable
You should use a loopback cable. A loopback cable is used to test the network function of the NIC by allowing it to send and receive network communication with itself.
A crossover cable connects two legacy or non-MDIX compliant devices, such as two computers, two hubs, or two switches.
Are patch cables the same thing as straight through cables?
A patch cable and a straight-through cable are the same thing. This is the standard cable used to connect networking devices.