# Disboard #
  • Reconnaissance
    • Quick Guide
    • Ports and Protocols
    • Passive Reconnaissance
    • Active Reconnaissance
  • Enumeration
    • Password Cracking
    • Hydra
    • Wireshark
    • Snort
    • Steganography
  • Web
    • OWASP Top 10
    • OWASP API
    • SQL Injection
      • Microsoft SQL Injection
    • Cross Site Scripting
    • Browser Vulnerabilities
    • Fuzzing
  • Linux
    • Privilege Escalation
    • Docker
    • Program Life Cycle
  • Windows
    • Privilege Escalation
    • Active Directory
    • Powershell
  • Event Logs
    • Sysmon
  • Exploitation
    • Shells
      • Upgrading Shells
    • Metasploit
      • Meterpreter
    • KOTH
    • Source Code Review
  • Hack the Box
    • ARCHETYPE
    • BASE
    • BASHED
    • EXPLORE
    • NIBBLES
  • Try Hack Me
    • ADVENTURE TIME
    • HACKFINITY
    • MOTHER'S SECRET
    • OFFSEC
    • POSTEXPLOIT
    • ROASTED
    • TEMPEST
    • TRAVERSE
  • CompTIA
    • Network
      • 1.0 Networking Fundamentals
      • 2.0 Network Implementations
      • 3.0 Network Operations
      • 4.0 Network Security
      • 5.0 Network Troubleshooting
    • PenTest
  • SIEM
    • Splunk
    • Elastic
  • Wireless
    • Wi-Fi Hacking
  • Other
    • PicoCTF
    • SSH Tunneling
    • Life Hacks
    • My Pokémon API
    • Github
Powered by GitBook
On this page
  • [5.1] Explain the network troubleshooting methodology
  • Identify the Problem
  • Establish a Theory of Probable Cause
  • Test the Theory to Determine the Cause
  • Establish a Plan of Action to Resolve the Problem
  • Implement the Solution or Escalate
  • Verify Full System Functionality & Implement Preventive Measures
  • Document Findings, Actions, Outcomes, Lessons Learned
  • [5.2] Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools
  • Specifications and Limitations
  • Cable Considerations
  • Cable Application
  • Common Issues
  • Common Tools
  • [5.3] Given a scenario, use the appropriate network software tools and commands
  • Software Tools
  • Command Line Tool
  • Basic Network Platform Commands
  • [5.4] Given a scenario, troubleshoot common wireless connectivity issues
  • Specifications and Limitations
  • Considerations
  • Common Issues
  • [5.5] Given a scenario, troubleshoot networking issues
  • Considerations
  • Common Issues
  1. CompTIA
  2. Network

5.0 Network Troubleshooting

[5.1] Explain the network troubleshooting methodology

Identify the Problem

Establish a Theory of Probable Cause

Test the Theory to Determine the Cause

Establish a Plan of Action to Resolve the Problem

Implement the Solution or Escalate

Verify Full System Functionality & Implement Preventive Measures

Document Findings, Actions, Outcomes, Lessons Learned

[5.2] Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools

Specifications and Limitations

Cable Considerations

Cable Application

Common Issues

Common Tools

[5.3] Given a scenario, use the appropriate network software tools and commands

Software Tools

Command Line Tool

Basic Network Platform Commands

[5.4] Given a scenario, troubleshoot common wireless connectivity issues

Specifications and Limitations

Considerations

Common Issues

[5.5] Given a scenario, troubleshoot networking issues

Considerations

Common Issues

Broadcast Storms: If broadcast frames are received by two switches, they can forward frames to each other --> multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding copies of the same initial frame

Previous4.0 Network SecurityNextPenTest

Last updated 2 years ago