Network Troubleshooting Flashcards
Net+ certification (49 cards)
What is the first step when troubleshooting a network problem?
A. Establish a probable cause theory.
B. Change the most obvious potential cause.
C. Identify the problem.
D. Establish a plan of action.
At what point in a troubleshooting methodology is it appropriate to escalate a problem? (Choose TWO.)
A. If no appropriate solution is available.
B. If the problem results in downtime.
C. If the technician is unable to confirm a theory and unable to establish a new theory.
D. If the information gathered indicates multiple possible theories.
E. If it is determined that preventive measures are appropriate.
A. If no appropriate solution is available.
C. If the technician is unable to confirm a theory and unable to establish a new theory.
Troubleshooting network problems
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
A service technician tests and confirms a theory for the probable cause of a problem.
What should the technician do next?
A. Escalate the problem.
B. Create a plan of action.
C. Implement a solution.
D. Apply preventive measures.
What is the last step in a systematic troubleshooting methodology?
A. Verify that the system is fully functional.
B. Apply applicable preventive measures.
C. Document the solution and the process.
D. Implement the solution in the plan of action.
C. Document the solution and the process.
Troubleshooting network problems
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
Users complain about intermittent connection issues with a file server. A junior technician has gathered all information and determined that no changes have been made in the network. What should the technician do next?
A. Escalate the problem to a senior engineer.
B. Test the most common solutions.
C. Use the OSI model to establish a theory of probable cause.
D. Establish a plan of action to fix the issue.
C. Use the OSI model to establish a theory of probable cause.
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
A technician has established a plan of action to resolve a problem on a network switch. The solution has been tested in a lab environment, and the technician has a list of commands to execute. After logging into the device, the technician realizes that the TACACS server blocks the commands they have to implement.
What should the technician do?
A. Assign the task to another person or department.
B. Document the findings and close the ticket.
C. Try alternative commands and scripts.
D. Reload the switch and try again.
A. Assign the task to another person or department.
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
Understanding TACACS+
A network administrator implements a change on a switch to fix a network issue. According to the troubleshooting methodology, what should the network administrator do next?
A. Duplicate the problem, if possible, in a lab environment.
B. Identify potential effects of the change.
C. Implement preventative measures.
D. Document all findings in a final report.
C. Implement preventative measures.
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
Users report that they have lost access to a network shared drive. They open a new help ticket and expect a quick resolution to the problem. What should the technician do next?
A. Escalate the issue to the server team.
B. Reboot the servers.
C. Check and replace the cabling in the communication room.
D. Gather more information from users.
D. Gather more information from users.
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology
A network technician has confirmed that faulty DNS records are causing connection timeouts. Which step of the troubleshooting methodology should the technician take NEXT?
A. Establish a theory
B. Verify system functionality
C. Establish an action plan
D. Document action taken
A user reports their laptop cannot connect to the network. Which action is a network technician MOST likely to perform after establishing a theory of probable cause?
A. Determine if the user recently made changes.
B. Test connectivity to a remote server with ping.
C. Search a knowledge base for related issues.
D. Create an image of the laptop’s hard drive.
B. Test connectivity to a remote server with ping.
Preventive Maintenance and Troubleshooting
ping
How to Create System Image Backup in Windows 10, 8 or 7 OS.
The Ultimate Guide to Creating a Customer Knowledge Base
A network administrator wants to ensure duplex mismatches are identified quickly. Which statistic should the administrator monitor?
A. Giants
B. CRC errors
C. Link state
D. Latency
A company routes Cat 5e UTP cabling through a part of its manufacturing floor that generates a great deal of Electromagnetic interference (EMI). The cables are routed loosely through the ceiling, about 3 meters above the equipment. Computers connected to the cabling experience communication errors any time the equipment is running.
The company needs a reliable, cost-effective solution. Management will not authorize converting to fiber optic cabling.
What should the company do?
A. Replace the Cat 5e UTP cable with Cat 6 UTP cable.
B. Reroute the cable through existing power conduit.
C. Reroute the cable along the floor.
D. Replace the Cat 5e UTP cable with Cat 5e STP cable.
D. Replace the Cat 5e UTP cable with Cat 5e STP cable.
Key Factors to Differentiate Cat5 vs Cat5e vs Cat6 vs Cat7 vs Cat8
STP vs UTP Cables: Comparing Each and When To Use Them
An on-site inspection fins that one fiber optic cable exceeds the bend radius that is recommended by the manufacturer. What should be the main concern for the company?
A. Duplex
B. Near end crosstalk
C. EMI
D. Attenuation
A technician is troubleshooting a faulty single mode connection between two network switches. The technician has determined that the issue is with the cabling. What should the technician do to address this issue?
A. Ensure that the cable core diameter is 9 microns.
B. Ensure that the cables support transmissions at the 1300nm wavelength.
C. Ensure that the cable classification is OM3 or OM4.
D. Ensure that the cables support transmissions at the 850nm wavelength.
A. Ensure that the cable core diameter is 9 microns.
Single Mode vs. Multimode Fiber… What’s the Difference?
Fiber Optic Cable Types Explained - Single Mode and Multimode
Single Mode vs. Multi-Mode Fiber Optic Cable
Single Mode vs. Multimode Fiber Optic Cables
A technician attempts to install a device that requires power over Ethernet. However, the device will not power on. The technician has verified that the device is functional and suspects that the upstream switch is not providing enough power. The device requires a port that supports a maximum power of 100 watts. What should the technician do to ensure that the device functions properly while optimizing power usage?
A. Verify that the switch supports PoE+.
B. Verify that the switch supports Type 1 PoE.
C. Verify that the switch supports IEEE 802.3bt Type 3.
D. Verify that the switch supports Type 4 PoE++.
D. Verify that the switch supports Type 4 PoE++.
Understanding PoE Standards and Wattage
What Are the Different Types of PoE?
What Is Power over Ethernet (PoE)?
PoE: Power over Ethernet
A network administrator connects all top-of-rack switches using a mesh architecture. Which of the following is required for error-free operations in this environment?
A. PoE
B. LACP
C. VLANs
D. STP
A company is deploying a new computer as shown in the exhibit. The company will have a static IPv4 address.
What should the technicians use as the computer’s default gateway?
A. 192.168.1.193
B. 192.168.1.129
C. 192.168.1.1
D. 192.168.1.65
A company deploys six new computers that are configured for automatic address assignment to the 192.168.4.0/26 subnet. The DHCP server that hosts the scope for the subnet is deployed on the same subnet.
Four of the new computers are able to lease valid IP addresses. The remaining two computers have the following addresses:
169.254.12.7
169.254.14.2
What is most likely wrong?
A. The DHCP server is failing.
B. The two computers were initially assigned duplicate IP addresses.
C. The DHCP scope is exhausted.
D. The TCP/IP stack did not load correctly on the two computers.
C. The DHCP scope is exhausted.
How to use automatic TCP/IP addressing without a DHCP server
Detection of Duplicate IP Addresses by Microsoft TCP/IP
Part of a company’s network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses.
Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem.
What is the most likely cause?
A. The 192.168.1.1 interface is failing.
B. Port 53 is blocked on the 192.168.1.129 interface.
C. The DNS server is failing.
D. Port 53 is blocked on the 192.168.1.1 interface.
D. Port 53 is blocked on the 192.168.1.1 interface.
Allow Both TCP and UDP Port 53 to Your DNS Servers
A company’s network is shown in the exhibit. PC1 is unable to access any resources in network B. What should the company do to fix the issue?
A. Change the subnet mask on PC1.
B. Change the subnet mask on the router.
C. Change the IP address on PC1.
D. Change the IP address on the router.
C. Change the IP address on PC1.
IP Addresses, Subnet Masks, and Default Gateways
Understand TCP/IP addressing and subnetting basics
PC1 is unable to access the internet in the network shown in the exhibit. What is the MOST likely cause?
A. A duplicate IP address
B. A rogue DHCP server
C. An expired IP address.
D. An invalid static IP address
A systems administrator cannot ping a file server running Windows Server. Users can access files on the server without any problems. What should the administrator check?
A. TCP/IP settings
B. ARP cache
C. Local firewall rules
D. NTFS permissions
Users report that they cannot access any resources on the Internet using an FTP client. It is determined that the connections have been denied by the firewall. All hosts from the local subnet of 192.168.1.0/25 should have access. Which ACL rule should the company implement?
A. An inbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23.
B. An outbound rule: permit host from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21.
C. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.
D. An inbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.
E. An inbound rule: permit host from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21.
F. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23.
C. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.
FTP Configuration on a Firewall
Subnet Mask Cheat Sheet
Difference between SSH and Telnet
A user complains they are unable to connect to the corporate network. A network administrator has verified other users are able to browse network resources without issues. The administrator runs ipconfig on the user’s workstation, which returns the following result:
Ethernet adapter ETH0:
Connection-specific DNS Suffix:
IPv4 Address. . . . . : 169.254.0.255
Subnet Mask . . . . . : 255.255.0.0
Default Gateway . . :
What should the administrator do to troubleshoot the issue?
A. Manually enter a default gateway address.
B. Enter a correct subnet mask for the address.
C. Verify the DHCP scope is not exhausted.
D. Verify the local firewall is deactivated.
C. Verify the DHCP scope is not exhausted.
What is APIPA (Automatic Private IP Addressing)?
What is default gateway
Understand TCP/IP addressing and subnetting basics
What is a firewall? How network firewalls work