Network Troubleshooting Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What tool should be used to verify connectivity on the management port?

  • Ping
  • nslookup
  • tcping (correct)
  • traceroute
  • What is an essential step in ensuring management traffic can reach network devices?

  • Configure firewall rules correctly (correct)
  • Reboot the monitoring server
  • Disconnect all other devices
  • Enable SNMP only
  • What should be done first when troubleshooting desktop performance issues?

  • Reinstall the operating system
  • Update all software applications
  • Run a full antivirus scan
  • Check Task Manager for resource usage (correct)
  • Which of the following actions can help resolve issues caused by corrupted application files?

    <p>Reinstalling the application</p> Signup and view all the answers

    What is the purpose of the 'sfc /scannow' command?

    <p>To repair corrupted system files</p> Signup and view all the answers

    Which step is NOT recommended when troubleshooting Blue Screen of Death (BSOD) errors?

    <p>Ignore the error and continue using the computer</p> Signup and view all the answers

    What should be done if applications are suspected of causing performance issues?

    <p>Clear temporary files used by those applications</p> Signup and view all the answers

    Which of the following is NOT a step to take when checking for malware on a desktop?

    <p>Disable all installed antivirus software</p> Signup and view all the answers

    What should be done first if Defender detects malware but cannot remove it fully?

    <p>Run Defender's Offline Scan to try removing persistent threats.</p> Signup and view all the answers

    Which step is NOT part of troubleshooting when SentinelOne agent does not connect to the management console?

    <p>Reboot the management console server.</p> Signup and view all the answers

    What is the first action to take if Webroot fails to update its virus definitions?

    <p>Check the internet connection and firewall settings.</p> Signup and view all the answers

    When Microsoft Defender is disabled by Group Policy, what is the crucial command to apply policy changes?

    <p>gpupdate /force</p> Signup and view all the answers

    If real-time protection in Defender is disabled, what action should NOT be taken?

    <p>Manually delete all Defender quarantine items.</p> Signup and view all the answers

    In which scenario should you consider manually deleting suspicious files or registry entries?

    <p>After identifying them during a previous malware assessment.</p> Signup and view all the answers

    Which should be done if the SentinelOne agent still cannot connect after basic troubleshooting?

    <p>Re-enroll the device in SentinelOne if necessary.</p> Signup and view all the answers

    What must you ensure if Group Policy disables Microsoft Defender?

    <p>That there are no conflicting settings in Intune.</p> Signup and view all the answers

    What is the first step to troubleshoot Kaspersky not initiating scans on external drives?

    <p>Open Kaspersky settings and navigate to scan options.</p> Signup and view all the answers

    When troubleshooting a user who cannot access Outlook, which step is irrelevant?

    <p>Ensure the user has Outlook installed on their device.</p> Signup and view all the answers

    What should be verified if a user reports being unable to access a SharePoint site?

    <p>The user’s permissions were recently modified on the SharePoint site.</p> Signup and view all the answers

    Which troubleshooting step is necessary when a device is not recognized correctly in the operating system while scanning with Kaspersky?

    <p>Verify that the external drive is functioning properly with another device.</p> Signup and view all the answers

    Which action should be taken if a user is not receiving MFA prompts during sign-in?

    <p>Check if the user's account has MFA enabled and properly configured.</p> Signup and view all the answers

    What is a potential reason a user may see a "Something went wrong" error when accessing Outlook?

    <p>The user's Outlook license is not assigned or is inactive.</p> Signup and view all the answers

    What is the correct step to troubleshoot if a user cannot access their SharePoint site?

    <p>Ensure the user’s account is still active and licensed for SharePoint.</p> Signup and view all the answers

    Which step should be taken last if Kaspersky isn't scanning external drives?

    <p>Restart the system if the issue persists and try scanning again.</p> Signup and view all the answers

    What is a necessary step to troubleshoot a user's inability to share files with external users in OneDrive or SharePoint?

    <p>Verify the organization's sharing settings in SharePoint Admin Center.</p> Signup and view all the answers

    Which action should be taken first when a user encounters device compliance issues accessing Microsoft 365 resources?

    <p>Review the user's device compliance status in Intune.</p> Signup and view all the answers

    If a remote worker cannot sign into Microsoft 365 from a new location, which policy should be reviewed first?

    <p>The Conditional Access policy regarding geographic restrictions.</p> Signup and view all the answers

    Which troubleshooting step is essential when a user’s account indicates a risky sign-in attempt?

    <p>Check for high-risk sign-in flags on the user's account.</p> Signup and view all the answers

    What should be confirmed regarding the user's device before accessing Microsoft 365 when compliance issues arise?

    <p>The presence of up-to-date security configurations.</p> Signup and view all the answers

    When advising a user who cannot share files externally, which consideration should be reviewed last?

    <p>User feedback on sharing methods.</p> Signup and view all the answers

    What is a recommended action if a user is blocked from signing in due to a Conditional Access policy?

    <p>Adjust the policy settings temporarily or include the new location.</p> Signup and view all the answers

    When reviewing external sharing settings in SharePoint, what should you primarily focus on?

    <p>The organization's sharing settings.</p> Signup and view all the answers

    What is the first step to take when a device enrollment fails due to a Conditional Access policy blocking access?

    <p>Check the specific requirements of the Conditional Access policy</p> Signup and view all the answers

    What should be verified to ensure a device can successfully enroll without conflicts?

    <p>Ensure there are no conflicting policies applied to the same device</p> Signup and view all the answers

    Which action is NOT recommended when troubleshooting a device enrollment failure due to Conditional Access?

    <p>Ignore the device group membership</p> Signup and view all the answers

    What should be done after confirming compliance requirements are met for device enrollment?

    <p>Initiate a sync from Intune to update compliance status</p> Signup and view all the answers

    After reviewing a Conditional Access policy, which aspect should also be verified to resolve enrollment issues?

    <p>Confirm user and device group membership in the Azure AD</p> Signup and view all the answers

    What is the first step to troubleshoot a non-compliant device due to missing BitLocker encryption?

    <p>Check the encryption policy compliance requirement.</p> Signup and view all the answers

    Which command can be used to manually evaluate compliance on a device?

    <p>Invoke-ComplianceEvaluation</p> Signup and view all the answers

    What should be checked first if an application fails to deploy through Intune?

    <p>Ensure the application is assigned to the correct user or device group.</p> Signup and view all the answers

    What action should be taken if using Microsoft Defender for antivirus?

    <p>Check for updates manually or schedule them.</p> Signup and view all the answers

    What is necessary to confirm device compliance regarding BitLocker?

    <p>Confirm that the latest encryption policy is deployed.</p> Signup and view all the answers

    When troubleshooting a compliance policy issue, what should be checked regarding the device?

    <p>If the device has met compliance policy requirements.</p> Signup and view all the answers

    Which of the following is NOT a step in troubleshooting a failed app deployment via Intune?

    <p>Reinstall the entire Intune application.</p> Signup and view all the answers

    What should be done if the device lacks sufficient storage for an application?

    <p>Delete unnecessary files from the device.</p> Signup and view all the answers

    Study Notes

    Network Troubleshooting

    • Connectivity issues involve ping tests using tools like Wireshark
    • Firewall policies, port blocking, and VPN connectivity issues are also addressed
    • Website access problems are diagnosed through ping tests to verify IP connectivity, DNS resolution checks, and firewall checks.
    • TCPing tests are used to see if website ports are open.
    • Website access is confirmed or issues are identified and resolved with different browsers or by disabling extensions.
    • Intermittent connectivity issues are troubleshooted through Gateway ping tests, network cable/Wi-Fi signal checks and IP conflict verification using arp -a

    VPN Connectivity Issues

    • Internal resource access problems are addressed by checking VPN IP addresses, pinging internal resources verifying firewall policy and DNS settings.
    • Route table is checked to see if routes to internal subnets are present.

    Network Latency Issues

    • High latency issues in network applications are identified by ping tests.
    • Traceroutes help pinpoint points of latency in the network path.
    • TCPing specific ports is used to identify any delays in connection establishment.
    • Bandwidth testing and QoS settings are verified.

    File/Folder Permission Issues

    • File server reachability is verified through ping tests.
    • Port 445 (SMB) is checked for accessibility.
    • DNS resolution to hostname is checked.
    • User permissions for the network share are confirmed.
    • File/folder ownership, permissions and encryption are checked if access to file/folder is restricted.

    Slow Network Speeds

    • Ping tests to confirm packet loss or high latency are performed.
    • Network bandwidth usage is checked for bottlenecks.
    • QoS settings and throttling policies are examined.
    • Latency is measured using tcping to services/websites.
    • Device network adapter settings are verified.

    User Can't Connect to Remote Desktop via VPN

    • Connectivity to the remote machine’s IP address is checked
    • Firewall policy is confirmed to allow RDP (usually on port 3389) through the VPN.
    • tcping test on port 3389 is used to confirm that the RDP port is open.
    • Correct routing between the VPN subnet and internal network is confirmed.
    • User has the correct permission to access remote desktop

    Network Device Inaccessibility

    • Device IP is confirmed to be reachable on the network.
    • TCPing tests are performed on the management port.
    • Firewall rules are checked to verify if traffic from the monitoring server to devices is allowed.
    • SNMP/SSH settings are checked for enabling.
    • Firmware is verified to be up-to-date.

    Application Crashes or Freezes

    • Application updates are checked for updates.
    • Temporary files are cleared.
    • Logs in Event viewer are checked for error codes.
    • Applications are run in compatibility mode with older OS versions if necessary.
    • Corrupted files are replaced by reinstalling the application.

    Blue Screen of Death (BSOD)

    • BSOD error code is recorded.
    • Recent driver, hardware or update installations are checked.
    • System files are scanned and repaired using the command sfc /scannow in the command prompt.
    • Drivers, especially graphics and chipset drivers, are updated.
    • Windows memory diagnostic is run to check for faulty RAM.

    Printer Not Responding

    • Printer connection is checked
    • Print Spooler service is restarted
    • Printer drivers are updated.
    • Default printer is verified to be correct.
    • Printing from a different application is tested.

    Network Connectivity Issues

    • Physical connections to the network cable or Wi-Fi signal strength are checked.
    • Network troubleshooter is run for automatic diagnostics.
    • DNS is flushed.
    • Firewall is disabled temporarily to see if blocking the connection.
    • Testing with another device verifies the network and user's device compatibility for connection problems.

    Account Lockout or Login Issues

    • Checking password expiry, especially in domain environments.
    • Resetting a user’s password if they are locked out
    • Checking logs in Event Viewer for login attempts.
    • Verifying Network Connection if login requires domain authentication
    • Clearing Cached Credentials if there are conflicting credentials

    File or Folder Permission Issues

    • Checking File Properties and verifying permissions under Security.
    • Taking ownership of the files or folders if access is restricted.
    • Adjusting permissions to allow user full access if necessary.
    • Checking for encryption and ensuring the user has the correct encryption key.
    • Checking Network drive permissions.

    Firewall and Security Troubleshooting

    • Firewall rules, access issues, and threat logs are addressed.
    • FortiClient VPN troubleshooting is mentioned.

    Application Traffic Blocked

    • Recent changes to firewall rules are reviewed.
    • Logs are analyzed to check if application traffic is denied.
    • Application ports are verified to ensure firewall rules permit application usage
    • Temporary rules are created to verify if traffic flows correctly.

    Unauthorized Access Attempts

    • Source IP address is identified.
    • Firewall rules are created to block incoming traffic from the suspicious IP.
    • Existing vulnerabilities are checked
    • Geo-IP blocking is enabled if needed.
    • Continued monitoring of logs is performed to identify new access attempts.

    FortiClient VPN Problems

    • VPN gateway reachability is confirmed through ping tests.
    • Required VPN ports are checked (e.g., 443, 500, 4500).
    • VPN credentials are confirmed to be correct
    • Firewall policy allowing VPN traffic is confirmed.
    • tcping tests are performed on the VPN port to confirm connectivity to the gateway.

    Remote User Cannot Connect to VPN

    • Configurations for VPN server address, username and password are verified.
    • User VPN permissions are verified.
    • Necessary firewall ports are confirmed to be open (example 443 or 500/4500 for IPsec).
    • Logs are reviewed for any errors.
    • Latest FortiClient version is verified

    Internal Service Unreachable

    • Recent rule changes are reviewed to see if they are causing an issue.
    • Required ports for the internal service are confirmed to be allowed.
    • Network segmentation is confirmed and restrictions, if any, are addressed.
    • Internal traffic is tested to check service reachability.

    High Traffic from Unusual IP

    • Source IP address details are identified and checked for malicious sources.
    • Temporary block rule for the IP address is created.
    • Traffic patterns are analyzed.
    • Internal device compromises and unusual traffic are checked.
    • Permanent block of the IP is implemented if necessary.

    New Server Failing to Connect to the Internet

    • IP and Gateway settings are checked.
    • Outbound rules are verified to permit internet access for server's subnet.
    • NAT configuration is checked for correct routing of internet-bound traffic.
    • Firewall logs are checked for any blocked traffic.
    • Connectivity is checked with ping and traceroute to diagnose connection failures.

    User Account Locked

    • Checking password expiry in domain environments
    • Resetting the user’s password if locked out
    • Reviewing logs for login attempts.
    • Checking network connection if domain authentication is required.
    • Checking and clearing cached credentials

    Failed Open Ports/Services Audit

    • Identified open ports are reviewed in the firewall configuration.
    • Validation if ports are essential to applications/services.
    • Ports that are not necessary are closed.
    • Logging for open ports is enabled.
    • Routine port scans are scheduled for future unexpected open ports

    Microsoft 365 issues

    • OneDrive Sync Issues: Checking user login, disk space, cache clearing and checking the correctness of user account names/passwords.
    • OneDrive Permissions Issues: Validating sharing permissions, email addresses, file restrictions and re-sharing files with correct permissions.
    • SharePoint Access Denied: Verifying user permissions, validating account activity, clearing cache and checking for compliance policies.
    • SharePoint Synchronization Issues: Confirming OneDrive installation, checking SharePoint permissions and clearing cached data.
    • Email delivery failure: Checking for email policy restrictions, ensuring the email address is valid, testing with other external domains and checking if external domains are blocked.
    • Email Attachment Issues: Checking file size limits, file sharing via other means such as links and confirming that the email client is updated.

    Device Management

    • Device enrollment failure: Checking user licenses, network connectivity, enrollment status page, enrollment restrictions and compliance policies.
    • Autopilot Enrollment Issues: Verifying profile assignment, resetting device, checking internet connectivity, checking logs for errors
    • Device non-compliance: Checking antivirus, compliance policy settings, syncing the devices and checking firewall settings
    • Application Deployment Failures: Confirming App assignment and checking installation requirements.
    • Security compliance policy warnings: Confirming compliance policy requirements and manually triggering a compliance check.
    • Autopilot stuck in Identifying phase: Checking Network Access, reviewing Autopilot profile and resetting the device if needed..

    Additional Notes

    • Best practices and troubleshooting tips for ongoing management are discussed.
    • Information is provided on resolving synchronization issues related to specific Microsoft 365 services (OneDrive and SharePoint), network connectivity, and device management.
    • Best practices for resolving common email issues, like large file attachments, external domain problems, and bounce-back issues, are noted.
    • Using tools like gpupdate /force, sfc /scannow, chkdsk /f, ipconfig /flushdns, netsh int ip reset, arp -a, tcping and others may help with troubleshooting different errors.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on network troubleshooting techniques, including connectivity issues, VPN connectivity, and network latency problems. This quiz covers various methods and tools such as ping tests, firewall checks, and DNS resolution to diagnose and resolve network problems.

    More Like This

    Use Quizgecko on...
    Browser
    Browser