Troubleshooting Network Issues Flashcards

(43 cards)

1
Q

What is a MAC Address?

A

A 12-digit hexadecimal number used to uniquely identify a network interface card (NIC) on a network

48 bits in total length: first 24 bits assigned by the hardware manufacturer, next 24 bits used to uniquely identify the NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the potential issues caused by Duplicate MAC Addresses?

A
  • Confusion in switch forwarding tables (CAM tables)
  • Connectivity problems

Duplicate MAC addresses can lead to network issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MAC Spoofing?

A

Using a self-assigned address (locally administered address) that can lead to duplicate MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can Virtual Machines (VMs) cause duplicate MAC addresses?

A

Virtual machines can create duplicate MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of a Logical Domain Manager?

A

Used as a preventive solution by monitoring and reassigning MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are symptoms of Duplicate MAC Addresses?

A
  • Network connectivity issues
  • Intermittent connectivity for affected devices

Identifying duplicate MAC addresses can be done using a protocol analyzer like Wireshark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command can be used to identify switch ports with duplicate MAC addresses?

A

show arp command on switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the causes of Duplicate IP Addresses?

A
  • Static IP assignments
  • DHCP server issues
  • Rogue DHCP servers

Duplicate IP addresses can also be referred to as IP address conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the symptoms of Duplicate IP Addresses?

A

Causes intermittent connectivity as routers may not know which device to send traffic to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you identify Duplicate IP Addresses?

A
  • Check network adapter properties for static or dynamic IP assignment
  • Use the show arp command on routers

Identifying duplicate IP addresses is crucial for network troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Dynamic Host Configuration Protocol (DHCP)?

A

A network management protocol used on IP networks to automatically assign IP addresses and other communication parameters to devices using a client-server architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Rogue DHCP Server?

A

A DHCP server on the network that is not under administrative control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the risks associated with Rogue DHCP Servers?

A
  • Can cause IP conflicts
  • Can create network connectivity issues

Rogue DHCP servers can be installed maliciously or accidentally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DHCP Scope Exhaustion?

A

Occurs when the DHCP server runs out of valid IPs to assign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are possible causes of DHCP Scope Exhaustion?

A
  • Too many devices requesting IPs simultaneously
  • Long lease times
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are solutions to DHCP Scope Exhaustion?

A
  • Increase the DHCP scope size
  • Decrease lease times for transient users
  • Enable port security or Network Access Control (NAC)

These measures can help manage DHCP resources effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Multicast Flooding?

A

Occurs when no specific host is associated with the multicast MAC address in the switch’s CAM table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the results of Multicast Flooding?

A

Results in multicast traffic being flooded throughout the LAN or VLAN, wasting resources.

19
Q

What is Asymmetrical Routing?

A

Occurs when packets leave via one path and return via a different path.

20
Q

What issues can Asymmetrical Routing cause?

A

Can cause issues with dropped packet flows and is problematic for security devices and network appliances performing deep packet inspection.

21
Q

What is a Missing Route?

A

Occurs when a router cannot reach a destination due to a missing route in the routing table.

22
Q

What is a common issue with static routes?

A

Static routes can be mistyped or not properly added.

23
Q

What command can be used to check routing tables in Cisco?

A

show ip route.

24
Q

What are Switching Loops?

A

Occur when there is more than one path between a source and destination device.

25
What can Switching Loops lead to?
Can lead to broadcast storms due to repeated broadcast messages in a looped architecture.
26
What protocol can be enabled to prevent Switching Loops?
Enable Spanning Tree Protocol (STP) on switches.
27
What are Routing Loops?
Formed when there is an error in the routing algorithm, creating a circular route.
28
What methods can prevent Routing Loops?
* Split Horizon * Route Poisoning * Hold-down timers ## Footnote These methods help in maintaining routing stability.
29
What are the two types of Firewalls?
* Host-based Firewall * Network-based Firewall ## Footnote Host-based firewalls protect individual devices, while network-based firewalls monitor traffic across the network.
30
What are common Firewall Issues?
* Access to protected resources from unprotected networks is not working * Access to unprotected resources from protected networks is not working * Access to the firewall and its configurations is not working
31
What is the 7-step Troubleshooting Method?
A systematic approach to troubleshooting network issues from Layer 1 to identifying the problem.
32
What is an Access Control List (ACL)?
A collection of permit and deny conditions providing security by blocking unauthorized users and allowing authorized users.
33
What command can be used to show ACLs on Cisco devices?
`show access-lists`.
34
What are key pieces of information every network client needs?
* IP address * Subnet mask * Default gateway IP * DNS server IP
35
What should be done if an IP address is in the wrong subnet?
Change it to an IP address in the correct subnet.
36
What is DNS?
Matches domain names with corresponding IP addresses.
37
What is a symptom of DNS issues?
Network clients unable to resolve domain names to IP addresses.
38
What is a common DNS troubleshooting step for network-wide issues?
Flush DNS cache and change to a different DNS server.
39
What does TTL stand for in DNS?
Time to Live.
40
What is the recommended TTL for frequent network changes?
Keep TTL short (e.g., 300 seconds).
41
What is the purpose of NTP?
Synchronize system clocks for distributed applications.
42
What can indicate a communication issue with NTP packets?
NTP packets not received, processed, or contain errors.
43
What can high dispersion in NTP packets indicate?
Packets take too long to reach the client from the server, affecting time accuracy.