5. Network Troubleshooting Flashcards

1
Q

The first step of troubleshooting; involves gathering facts and identifying what’s wrong.

A

Identify the Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ask for logs, observe behavior, or check device status to understand the issue.

A

Gather Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Speak with users to understand when and how the problem occurred.

A

Question Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Look for commonalities across affected systems—errors, slowness, disconnects.

A

Identify Symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Check if new software, updates, changes, or configurations triggered the issue.

A

Determine if Anything Has Changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attempt to recreate the issue to better understand and observe it.

A

Duplicate the Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tackle one issue at a time rather than combining them—simplifies troubleshooting.

A

Approach Multiple Problems Individually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use logic to guess the most likely root cause of the issue.

A

Establish a Theory of Probable Cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Look for obvious causes before diving deep.

A

Question the Obvious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Start at one end of the OSI model and work your way through each layer.

A

Top-to-Bottom / Bottom-to-Top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pick a midpoint in the OSI model and work toward both ends to isolate the issue.

A

Divide and Conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Run tests or replace components to validate the cause of the problem.

A

Test the Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If your theory is confirmed, create a strategy to resolve the issue.

A

Determine Next Steps to Resolve Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If your theory is wrong, either adjust your theory or escalate the issue to a higher tier.

A

Establish a New Theory or Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Develop a fix and consider what impact it might have on the system or users.

A

Establish a Plan of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Apply the fix, or escalate if it’s outside your authority or skill set.

A

Implement the Solution or Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Check that the fix worked, and confirm everything is running smoothly.

A

Verify Full System Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Add configurations, alerts, or processes to prevent the issue from returning.

A

Implement Preventive Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Record everything you did, what worked, and what didn’t—used for future reference and training.

A

Document Findings, Actions, Outcomes, and Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You can’t fix what you don’t understand—this first step includes gathering all relevant details, asking questions, and confirming what’s broken.

A

Identify the Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This means pulling logs, checking error messages, examining topology maps, and reviewing system status.

A

Gather Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Users can offer insight into what happened and when—crucial for timeline reconstruction.

A

Question Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Recognizing patterns across systems helps isolate the issue—slow speeds, app crashes, dropped connections are all examples.

A

Identify Symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Often the root of issues—config updates, hardware changes, or environmental factors may have triggered the problem.

A

Determine if Anything Has Changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Reproducing the issue on demand helps confirm symptoms and test theories more effectively.

A

Duplicate the Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Avoid the trap of trying to fix everything at once—each problem may require a unique solution path.

A

Approach Multiple Problems Individually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A “working guess” based on experience or evidence—it narrows your focus before deep testing begins.

A

Establish a Theory of Probable Cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Check the basics first—cables, power, mute buttons—before diving into complex analysis.

A

Question the Obvious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This structured method checks each OSI layer one-by-one—great for beginners or thorough testing.

A

Top-to-Bottom / Bottom-to-Top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Start in the middle (often the network layer) and test outward—faster for experienced techs.

A

Divide and Conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Use pings, port resets, or part replacements to verify if your theory holds water.

A

Test the Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Once you’re confident in the cause, you need a game plan to fix it—without breaking anything else.

A

Determine Next Steps to Resolve Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

If tests disprove your theory, create a new hypothesis or call in a higher-tier tech.

A

Establish a New Theory or Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Before making changes, think through what else might break—does this fix cause service downtime or impact another department?

A

Establish a Plan of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

If you’ve got approval and the fix is safe, go for it—otherwise, escalate to a more senior technician.

A

Implement the Solution or Escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Just because the issue seems resolved doesn’t mean it’s fully fixed—confirm that all systems and users are working as expected.

A

Verify Full System Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

After fixing the issue, consider patching, alerts, backups, or other improvements to prevent recurrence.

A

Implement Preventive Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Write it all down—what went wrong, what fixed it, and what others should know next time. Great for team learning and future reference.

A

Document Findings, Actions, Outcomes, and Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the first step in the troubleshooting process?
A. Establish a theory of probable cause
B. Gather information
C. Identify the problem
D. Test the theory

A

C. Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following actions is part of identifying the problem?
A. Implement the solution
B. Duplicate the issue
C. Document actions
D. Create an ACL

A

B. Duplicate the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which method starts at one end of the OSI model and works through each layer?
A. Divide and conquer
B. Question the obvious
C. Top-to-bottom or bottom-to-top
D. Document and escalate

A

C. Top-to-bottom or bottom-to-top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What should you do if your original theory is proven incorrect?
A. Implement the fix anyway
B. Document your findings
C. Establish a new theory or escalate
D. Reboot all systems

A

C. Establish a new theory or escalate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which step ensures the issue won’t return and that the fix didn’t break anything else?
A. Test the theory
B. Verify full system functionality
C. Duplicate the problem
D. Escalate the ticket

A

B. Verify full system functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Why is documenting your troubleshooting process important?
A. It ensures more downtime
B. It helps prevent future issues and builds institutional knowledge
C. It reduces the need for backups
D. It avoids having to test solutions

A

B. It helps prevent future issues and builds institutional knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which technique involves picking a midpoint in the OSI model and testing outward from there?
A. Top-down
B. Divide and conquer
C. Isolation
D. Preventive analysis

A

B. Divide and conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

After confirming the theory, what comes next?
A. Document the findings
B. Implement a fix
C. Escalate the issue
D. Establish a plan of action

A

D. Establish a plan of action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which troubleshooting step includes checking for patches, updates, or policy changes that might help prevent recurrence?
A. Identify the problem
B. Implement the solution
C. Document the issue
D. Implement preventive measures

A

D. Implement preventive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the purpose of questioning the obvious during troubleshooting?
A. To escalate more efficiently
B. To save time by checking simple fixes first
C. To delay deep analysis
D. To confirm OSI model layers

A

B. To save time by checking simple fixes first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Using a cable not rated for the distance or application can cause connectivity or signal issues.

A

Incorrect Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A fiber type used for long distances and high bandwidth; uses a single light path.

A

Single-Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Fiber type used for shorter distances with multiple light paths.

A

Multimode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Common twisted-pair copper cable types used for Ethernet.

A

Category 5/6/7/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Cable that has shielding to reduce electromagnetic interference.

A

Shielded Twisted Pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Twisted-pair cable that lacks shielding, more common in low-interference environments.

A

Unshielded Twisted Pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Degradation in signal strength or quality over distance.

A

Signal Degradation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Electrical signals bleeding into adjacent cables, causing interference.

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Radio-frequency or electromagnetic noise that disrupts signal integrity.

A

Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Reduction in signal strength over distance or poor-quality cable.

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Wires are not terminated properly on connectors, leading to poor signal or no connection.

A

Improper Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Fiber or copper cables are connected in reverse, blocking communication.

A

TX/RX Transposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

When interface counters increase, they can indicate physical or configuration problems.

A

Increasing Interface Counters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Indicates data integrity issues, often caused by physical layer problems.

A

Cyclic Redundancy Check (CRC) Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Frames smaller than expected—often caused by collisions or physical damage.

A

Runts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Frames larger than allowed—may result from bad NICs or configuration.

A

Giants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Packets that are dropped due to congestion or configuration problems.

A

Drops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Indicates that a port is shut down due to errors or security violations.

A

Error Disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The port is manually shut down by an admin.

A

Administratively Down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Port is in a paused or inactive state—may be caused by protocols like STP.

A

Suspended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Network ports supplying power to devices like phones or APs.

A

Power over Ethernet (PoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The total power used by connected PoE devices exceeds the switch’s capacity.

A

Power Budget Exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Using a device that doesn’t match the supported PoE type or voltage.

A

Incorrect PoE Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Pluggable modules used to convert electrical signals into optical signals (or vice versa).

A

Transceivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Occurs when the module and the device or cable type don’t match.

A

Mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Refers to the level of signal being sent or received—too weak can cause drops.

A

Signal Strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Using the wrong cable type—like Cat 5 instead of Cat 6 for gigabit—can cause signal loss, slow speeds, or no connectivity.

A

Incorrect Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

This fiber type is designed for long distances using a single laser light—ideal for WAN links but incompatible with multimode gear.

A

Single-Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Used over shorter distances (typically <500m), this fiber type supports multiple light paths and often uses LED-based transceivers.

A

Multimode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Ethernet cables vary in shielding and speed—Cat 5 tops out at 100 Mbps, while Cat 6/6a and higher are built for gigabit+.

A

Category 5/6/7/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

This cable has metal shielding to protect against EMI—useful in industrial or high-noise environments.

A

Shielded Twisted Pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Standard Ethernet cable used in most office and residential settings—cheaper, more flexible, but less EMI-resistant.

A

Unshielded Twisted Pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

When signal gets weaker as it travels across long distances or poor cables—can cause timeouts or lost packets.

A

Signal Degradation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

When signals from one wire pair bleed into another—especially bad in unshielded or poorly installed cable.

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

External electrical signals (e.g., from lights, motors, or radio waves) that interfere with cable performance.

A

Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Natural signal loss over distance—affects both fiber and copper. Longer runs need better cable or signal boosters.

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Improper crimping or misaligned wires can result in flapping connections, CRC errors, or full link failure.

A

Improper Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Happens when transmit and receive lines are swapped—usually shows as no connectivity or traffic flow.

A

TX/RX Transposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Interface counters are diagnostic tools—rising error counts often mean physical problems or duplex mismatches.

A

Increasing Interface Counters

88
Q

These errors indicate data was corrupted in transit—usually due to bad cabling, interference, or failing NICs.

A

Cyclic Redundancy Check (CRC) Errors

89
Q

Small, malformed packets (less than 64 bytes)—usually from collisions or cable damage.

90
Q

Oversized packets that exceed MTU—may be caused by jumbo frames or misconfigured devices.

91
Q

Packets dropped due to buffer overflow, bandwidth saturation, or hardware errors.

92
Q

Switch shuts down a port after detecting errors or policy violations—often seen in port security breaches.

A

Error Disabled

93
Q

This port state means a network admin manually shut it down via configuration.

A

Administratively Down

94
Q

A suspended port is in a non-forwarding state—may be triggered by STP or errors.

95
Q

Supplies power to VoIP phones, access points, and cameras directly from the switch—removes need for wall adapters.

A

Power over Ethernet (PoE)

96
Q

When too many PoE devices draw more power than the switch can provide, devices may lose power intermittently.

A

Power Budget Exceeded

97
Q

If the switch supports PoE+ but the device needs PoE++ (or vice versa), it may not power up properly.

A

Incorrect PoE Standard

98
Q

Small, hot-swappable modules used in fiber or high-speed copper connections—need to match port and media type.

A

Transceivers

99
Q

Occurs when you mix incompatible transceivers or use the wrong cable type—can cause loss of link or errors.

100
Q

Low light levels in fiber, or weak electrical signal in copper, can cause flapping, slow speeds, or dropped packets.

A

Signal Strength

101
Q

Which of the following would most likely cause increased CRC errors on an interface?
A. Incorrect VLAN
B. Poor cable shielding
C. Spanning Tree Protocol
D. Jumbo frame support

A

B. Poor cable shielding

102
Q

Which cable type is designed for longer distances and uses a single light path?
A. Multimode fiber
B. STP
C. UTP
D. Single-mode fiber

A

D. Single-mode fiber

103
Q

Which issue occurs when the transmit and receive wires are reversed?
A. Runts
B. Attenuation
C. TX/RX transposed
D. CRC errors

A

C. TX/RX transposed

104
Q

A technician notices that an interface shows a large number of “giants.” What is a likely cause?
A. Duplex mismatch
B. Oversized frames
C. Cable attenuation
D. Link flapping

A

B. Oversized frames

105
Q

Which of the following best describes a “runt” on a network interface?
A. A dropped packet due to power issues
B. A packet smaller than the minimum frame size
C. A fiber mismatch
D. A protocol mismatch

A

B. A packet smaller than the minimum frame size

106
Q

A network port is down and labeled “error-disabled.” What’s the likely cause?
A. The cable is unplugged
B. The port was administratively shut down
C. The port violated a policy or experienced errors
D. A switch reboot is required

A

C. The port violated a policy or experienced errors

107
Q

What happens when a PoE switch exceeds its power budget?
A. Devices get disconnected due to overheating
B. Interfaces stop forwarding traffic
C. PoE devices may lose power or fail to start
D. VLANs stop functioning

A

C. PoE devices may lose power or fail to start

108
Q

Which problem is most likely to cause increasing interface counters and random disconnects?
A. Incorrect VLAN
B. Improper cable termination
C. Mismatched MTU
D. Protocol mismatch

A

B. Improper cable termination

109
Q

What is the main difference between STP and UTP cables?
A. UTP supports higher speeds
B. STP is for fiber only
C. STP has shielding to prevent interference
D. UTP is only used in industrial environments

A

C. STP has shielding to prevent interference

110
Q

Which issue is most likely if a transceiver works with one cable type but fails with another?
A. Poor signal strength
B. Duplex mismatch
C. Transceiver mismatch
D. Incorrect VLAN tag

A

C. Transceiver mismatch

111
Q

A protocol that prevents network loops in a Layer 2 switching environment.

A

Spanning Tree Protocol (STP)

112
Q

Occurs when redundant links forward traffic simultaneously, causing broadcast storms and congestion.

A

Network Loop

113
Q

The central switch selected by STP to determine path calculations.

A

Root Bridge

114
Q

Defines how a port behaves in STP (e.g., forwarding, blocking, listening).

115
Q

STP uses these to manage transition of port states like forwarding or blocking.

A

Port State

116
Q

A port assigned to the wrong VLAN may not receive the expected traffic.

A

Incorrect VLAN Assignment

117
Q

Rules that allow or deny network traffic based on IP, port, or protocol.

A

Access Control List (ACL)

118
Q

The list of known paths that a router uses to determine how to forward packets.

A

Routing Table

119
Q

A route used when no specific path to a destination is known.

A

Default Route

120
Q

Occurs when there are no more available IPs in a DHCP pool.

A

Address Pool Exhaustion

121
Q

When the gateway IP address configured on a host is incorrect, it can’t reach remote networks.

A

Incorrect Default Gateway

122
Q

Occurs when a device has an incorrect IP address, which may block network access.

A

Incorrect IP Address

123
Q

Two devices on the same network are using the same IP address, causing intermittent or broken connectivity.

A

Duplicate IP Address

124
Q

Incorrect network mask can cause a host to believe devices are local or remote when they aren’t, breaking routing.

A

Incorrect Subnet Mask

125
Q

This protocol runs on switches to prevent loops by blocking redundant links unless needed as backups. Without it, broadcast storms can crash the network.

A

Spanning Tree Protocol (STP)

126
Q

Occurs when multiple Layer 2 paths forward traffic endlessly—can flood switches and bring the network down fast.

A

Network Loop

127
Q

The designated switch in a STP topology used as the central reference point for path decisions. If it changes unexpectedly, network behavior may change.

A

Root Bridge

128
Q

STP assigns each port a role—such as root, designated, or blocking—to determine how traffic flows and to prevent loops.

129
Q

STP ports cycle through states (blocking, listening, learning, forwarding, disabled) that affect whether traffic is passed or paused.

A

Port State

130
Q

If a device is placed on the wrong VLAN, it may not have access to its expected subnet, DHCP scope, or services.

A

Incorrect VLAN Assignment

131
Q

These rules are used on routers, switches, or firewalls to permit or block traffic. A misconfigured rule can block legitimate communication.

A

Access Control List (ACL)

132
Q

Routers rely on this table to determine where to send packets. If it’s missing entries or outdated, packets may be dropped or misrouted.

A

Routing Table

133
Q

Used when no more specific route is found. If misconfigured or missing, devices may not reach the internet or external networks.

A

Default Route

134
Q

When a DHCP server runs out of assignable addresses, new devices can’t connect and may receive APIPA addresses (169.254.x.x).

A

Address Pool Exhaustion

135
Q

If this IP is incorrect, the host may be able to reach devices on the same subnet but fail to access anything outside of it.

A

Incorrect Default Gateway

136
Q

A static or misconfigured IP can place the device on the wrong network, or outside of the DHCP scope, causing isolation or IP conflicts.

A

Incorrect IP Address

137
Q

Two devices share the same IP—this often results in network flapping, dropped packets, or DHCP failures.

A

Duplicate IP Address

138
Q

This defines the size of the local network. An incorrect mask can make a host misidentify which traffic is local and which needs routing.

A

Incorrect Subnet Mask

139
Q

What is the primary purpose of Spanning Tree Protocol (STP)?
A. Assign IP addresses
B. Route internet traffic
C. Prevent Layer 2 loops
D. Encrypt VLAN traffic

A

C. Prevent Layer 2 loops

140
Q

Which condition is most likely caused by a missing or incorrect default route?
A. Devices cannot communicate locally
B. DNS fails internally
C. External websites are unreachable
D. MAC addresses won’t resolve

A

C. External websites are unreachable

141
Q

What happens when two hosts are configured with the same IP address?
A. One device switches to a reserved address
B. Both function normally
C. Packet collisions and intermittent connectivity
D. One device becomes a DHCP server

A

C. Packet collisions and intermittent connectivity

142
Q

A user connects to the network but can’t reach external websites. Their IP and subnet mask are correct. What is the likely cause?
A. Duplicate IP
B. Incorrect VLAN
C. Incorrect default gateway
D. STP loop

A

C. Incorrect default gateway

143
Q

Which of the following STP roles is responsible for forwarding traffic on the shortest path to the root bridge?
A. Blocking
B. Root port
C. Alternate port
D. Listening

A

B. Root port

144
Q

Which of the following can cause a host to receive an APIPA address (169.254.x.x)?
A. ACL block
B. VLAN mismatch
C. Address pool exhaustion
D. Incorrect subnet mask

A

C. Address pool exhaustion

145
Q

A router is dropping packets to a remote network. The routing table does not include a specific route. What is missing?
A. ACL
B. VLAN assignment
C. Subnet mask
D. Default route

A

D. Default route

146
Q

An interface is in the correct VLAN but can’t access its gateway. What should you check first?
A. Duplicate IP
B. ACLs blocking the subnet
C. DHCP lease time
D. Root bridge selection

A

B. ACLs blocking the subnet

147
Q

What problem is likely if a host can communicate locally but not with hosts on another VLAN?
A. Default gateway missing
B. VLAN assignment is incorrect
C. DNS server is down
D. IP conflict

A

B. VLAN assignment is incorrect

148
Q

A user reports unstable network connectivity. You find their device has the same IP as a printer. What’s the issue?
A. Routing loop
B. Default route missing
C. Duplicate IP address
D. STP topology change

A

C. Duplicate IP address

149
Q

Occurs when multiple devices or applications compete for the same limited resources.

A

Congestion / Contention

150
Q

A weak link in the network that limits overall performance.

A

Bottlenecking

151
Q

The maximum rate at which data can be transferred over a connection.

152
Q

The actual rate at which data is successfully delivered over a network.

A

Throughput

153
Q

The delay between when data is sent and when it is received.

154
Q

Data packets that fail to reach their destination.

A

Packet Loss

155
Q

Variation in the time it takes for packets to reach their destination.

156
Q

Occurs when multiple wireless channels interfere with one another.

A

Channel Overlap

157
Q

Weak signal strength over distance or due to obstacles.

A

Signal Degradation / Loss

158
Q

When the wireless network does not adequately cover a physical area.

A

Insufficient Wireless Coverage

159
Q

When clients are disconnected from a wireless network unexpectedly.

A

Client Disassociation Issues

160
Q

Misconfigured handoffs between access points cause connection drops or slowness.

A

Roaming Misconfiguration

161
Q

When too many users or apps try to use the same network path or resource, performance degrades — think peak hour slowness or overworked switches.

A

Congestion / Contention

162
Q

A slow component (like a 100 Mbps switch on a gigabit network) holds back the performance of faster systems — a common issue in mixed-speed environments.

A

Bottlenecking

163
Q

This is the theoretical maximum capacity of a network path (e.g., 1 Gbps) — not always what you actually get.

164
Q

The actual data transfer rate — influenced by congestion, packet loss, and hardware. If it’s much lower than the rated bandwidth, something’s wrong.

A

Throughput

165
Q

Measured in milliseconds (ms), this delay can cause sluggish behavior in VoIP, gaming, or web apps — high latency = high frustration.

166
Q

If packets never make it to the destination, it can cause audio cutouts, freezing video, or failed connections — often due to interference, poor cabling, or congestion.

A

Packet Loss

167
Q

Inconsistent packet arrival times — major problem in real-time apps like voice or video, often due to network congestion or poor routing.

168
Q

Wireless channels (especially in 2.4 GHz) overlap — when two APs use the same or adjacent channels, interference skyrockets.

A

Channel Overlap

169
Q

Walls, distance, and poor placement cause the wireless signal to weaken, leading to retries, dropped packets, and slow speeds.

A

Signal Degradation / Loss

170
Q

Some areas may not have adequate Wi-Fi coverage — leads to dead zones where users lose connection entirely.

A

Insufficient Wireless Coverage

171
Q

Clients are unexpectedly dropped from the network — could be caused by weak signal, too many clients, interference, or power saving settings.

A

Client Disassociation Issues

172
Q

Occurs when devices don’t smoothly transition between access points — may stick to weak APs or drop entirely, often due to poor AP placement or config.

A

Roaming Misconfiguration

173
Q

Which of the following describes a network experiencing competition for limited bandwidth?
A. Latency
B. Jitter
C. Contention
D. Roaming

A

C. Contention

174
Q

A user reports choppy audio on VoIP calls, but latency and packet loss are within limits. What should you check next?
A. Throughput
B. Channel overlap
C. Jitter
D. Bandwidth

175
Q

Which wireless issue occurs when two nearby access points are using overlapping channels?
A. Signal loss
B. Roaming
C. Channel overlap
D. Jitter

A

C. Channel overlap

176
Q

What issue might you suspect if a user’s connection is fine in one part of the office but drops in another?
A. Bottleneck
B. Insufficient wireless coverage
C. Duplicate IP
D. Looping

A

B. Insufficient wireless coverage

177
Q

Which performance problem involves a weak link limiting the entire network’s throughput?
A. Jitter
B. Bottlenecking
C. Contention
D. Disassociation

A

B. Bottlenecking

178
Q

A user experiences frequent disconnects from the wireless network when moving between floors. What’s the likely cause?
A. Signal degradation
B. Packet loss
C. Roaming misconfiguration
D. Channel saturation

A

C. Roaming misconfiguration

179
Q

Which metric is most directly affected when large amounts of data are dropped and not successfully received?
A. Latency
B. Throughput
C. Bandwidth
D. ACLs

A

B. Throughput

180
Q

What might high latency cause in user experience?
A. Instant disconnections
B. Increased download speed
C. Slow response times in applications
D. Roaming loops

A

C. Slow response times in applications

181
Q

Which problem describes differences in arrival times of packets that affect real-time communication?
A. Packet loss
B. Latency
C. Jitter
D. Signal fade

182
Q

You notice clients are randomly dropping from the Wi-Fi network. What is the most likely cause?
A. MAC filtering
B. Client disassociation issues
C. Routing loop
D. DHCP scope mismatch

A

B. Client disassociation issues

183
Q

Captures and inspects packet data flowing through a network — useful for deep traffic analysis.

A

Protocol Analyzer

184
Q

Tests network reachability by sending ICMP Echo Requests.

185
Q

Displays the path that packets take to reach a destination, hop by hop.

A

traceroute / tracert

186
Q

Resolves DNS names to IP addresses and tests name resolution.

187
Q

Captures packets from the command line for real-time analysis.

188
Q

Performs advanced DNS queries with extended output options (Available by default on macOS and Linux, not Windows).

189
Q

Displays active connections, ports, and protocol usage.

190
Q

Used to view and configure IP address settings on a device.

A

ip / ifconfig / ipconfig

191
Q

Displays and modifies the local Address Resolution Protocol (ARP) cache.

192
Q

Scans a network to discover hosts, open ports, and services.

193
Q

Protocol that discovers directly connected Layer 2 devices.

A

Link Layer Discovery Protocol (LLDP)

194
Q

Cisco-specific protocol that discovers neighboring Cisco devices.

A

Cisco Discovery Protocol (CDP)

195
Q

Measures the upload/download speed and latency of an internet connection.

A

Speed Tester

196
Q

Used to trace and identify individual cable runs in walls or patch panels.

197
Q

Tests cable pinouts, continuity, and wiring faults.

A

Cable Tester

198
Q

Hardware tool used to passively monitor or capture network traffic.

199
Q

Detects nearby wireless networks, signal strength, and interference.

A

Wi-Fi Analyzer

200
Q

A device that shines light through a fiber optic cable to identify breaks or faults.

A

Visual Fault Locator

201
Q

Displays the MAC addresses learned on each switch port.

A

show mac-address-table

202
Q

Displays the routing table on a router or Layer 3 switch.

A

show route

203
Q

Displays port status, bandwidth usage, and error counters.

A

show interface

204
Q

Shows current device configuration, including interfaces, VLANs, and IPs.

A

show config

205
Q

Displays the ARP cache of the device.

206
Q

Lists VLAN assignments and configurations.

207
Q

Shows PoE information for devices connected to switch ports.

A

show power

208
Q

Which command is used to test DNS name resolution?
A. ping
B. traceroute
C. nslookup
D. arp

A

C. nslookup

209
Q

A technician wants to scan a subnet for active hosts and open ports. Which tool should they use?
A. netstat
B. ping
C. Nmap
D. dig

210
Q

Which command shows current IP address settings on a Windows device?
A. ifconfig
B. show config
C. arp
D. ipconfig

A

D. ipconfig

211
Q

What tool should be used to check for cabling faults like short circuits or miswires?
A. Toner
B. Tap
C. Cable Tester
D. Speed Tester

A

C. Cable Tester

212
Q

A network engineer needs to view the MAC addresses learned on each switch port. Which command should they use?
A. show interface
B. show route
C. show vlan
D. show mac-address-table

A

D. show mac-address-table

213
Q

Which tool can detect signal strength and channel overlap in a wireless environment?
A. Tap
B. Wi-Fi Analyzer
C. dig
D. tcpdump

A

B. Wi-Fi Analyzer

214
Q

You’re on a macOS device and suspect a domain name is not resolving correctly. Which tool provides detailed DNS query output?
A. arp
B. traceroute
C. dig
D. tcpdump

215
Q

What is the purpose of the traceroute command?
A. Scan open ports
B. Display MAC addresses
C. Show the path to a remote host
D. Assign IP addresses

A

C. Show the path to a remote host

216
Q

Which Cisco-specific protocol shows directly connected Cisco neighbors?
A. LLDP
B. CDP
C. ARP
D. Nmap

217
Q

Which hardware tool is used to visually identify breaks in a fiber optic cable?
A. Visual Fault Locator
B. Cable Tester
C. Tap
D. Speed Tester

A

A. Visual Fault Locator