Anda di halaman 1dari 151

(13)JIHAN ROHADATUL AISY

1. For static routing functionality, additionally to the RouterOS system package, you will also need the
following software package:

A .None

B.DHCP

C.Routing

D.Advance-Tools

Penjelasan: Static route memang tidak membutuhkan paket. Static Route memang sudah seperti
Routing yang diberikan oleh seluruh alat.

2. What protocol is used for Ping and Trace Route?

A.IP

B.DHCP

C.ICMP

D.UDP

E.TCP

Penjelasan:ICMP merupakan protokol yang digunakan untuk ngeping dan ngetraceroute

3. Collisions are possible in full-duplex Ethernet networks .

FALSE

Penjelasan: Tidak semua Kesalahan dala networking itu berasal dari Ethernet. Semua kesalahan

bisa terjadi mulai dari salah konfigurasi, kesalahan Router maupun kesalahan pada kabel

sehingga jawaban yang tepat adalah False karena tidak semua kesalahan terjadi pada kabel

4. It is impossible to disable user "admin" at the menu "/user

FALSE

Penjelasan: Jika kamu pernah membuka Winbox dan membuka menu "User" maka kamu dapat

mengetahui jawaban ini. User Admin merupakan Default User yang diberikan oleh Mikrotik

agar dapat mengakses Winbox. User ini dapat kita Delete maupun kita Disable. so it Possible to

Disable Admin User

5. Select valid SUBNET masks:

A.255.192.0.0
B.255.255.224.0

C.192.0.0.0

D.255.255.192.255

Penjelasan: Subnet mask adalah istilah teknologi in ormasi dalam Bahasa Inggris yang

mengacu kepada angka biner 32 bit yang digunakan untuk membedakan network ID dengan

Host ID, menunjukan letak suatu host, apakah berada di jaringan lokal atau luar. untuk

menentukannya bisa dilihat dari table ip.

6. You need to reboot a RouterBoard after importing a previously exported rsc fle to activate the new
confguration.

TRUE

Penjelasan:Reboot bisa dipakai saat kamu mengimport export fle atau backup fle karena jika

kamu ga mereboot RouterBoard kamu maka backup fle kamu atau export flenya tidak akan ke

read sebelum kamu mereboot RouterBoardnya

7. You have a DHCP server on your MikroTik router. The IP addresses 10.1.2.2-10.2.2.20 are distributed
in the DHCP network. Additionally, 3 static IP address are defined for your servers: 10.1.2.31-
10.1.2.33. After a while 20 more IP addresses need to be distributed in the network. It is possible to
distribute the extra IP address without adding another DHCP Server:

TRUE

Penjelasan : kita harus menambahkan ip pool lagi tanpa menambahkan DHCP Server

8. It is required to make a web server on a private LAN visible on the Public Internet. Only the web
server port should be visible to the public. Which of the following configuration steps must be met.
(select all that apply)

A. Public IP address of the webserver must be installed on the NAT Router

B. A route between the NAT Router and the webserver must exist

C. Connection Tracking must be enabled on NAT router

D. in ip firewall NAT there should be a dst-nat between the public ip of the router and the

private ip of the webserver

E. LAN address of the webserver should be routable on the in ternet

Penjelasan : IP public web server harus di terjemahkan ke IP Private untuk di konfig

9. There can be more than one PPPoE server in a single broadcast domain:

TRUE
10. You want to use PCQ and allow 256k maximum download and upload for each client. Choose correct
argument values for the required queue.

A. kind=pcq pcq-rate=256000 pcq-classifier=src-address

B. kind=pcq pcq-rate=1256000 pcq-classifier=dst-address

C. kind=pcq pcq-rate=256000 pcq-classifier=dst-address

D. kind=pcq pcq-rate=5000000 pcq-classifier=src-address

E. kind=pcq pcq-rate=5000000 pcq-classifier=dst-address

Penjelasan : karena kita harus menyesuaikan max-limit

11. Which of the following actions is available for '/ ip firewall mangle' (select all valid actions)

A.Change MSS

B. Mark the connection

C. Accept

D. Jumping

E. Descent

F. Mark the package

12. You need to set the E1 (T1) connection with the configured PPP. Which License Level are needed?

A. Level 4

B. That can't be done on RouterOS

C. Level 5

13. You have a router with Public-IP configuration: 202.168.125.45/24- Default Gateway:
202.1687.125.1-DNS Server: 248.115.148.136, 248.115.148.137-Local IP: 192.168.2.1/24 Mark
configuration connections on the client PC to access to the internet

A.IP: 192.168.2.115/24 gateway: 192.168.2.1

B.IP: 192.168.0.1/24 gateway: 192.168.2.1

C.IP: 192.168.1.223/24 gateway: 248.115.148.136

D.IP: 192.168.2.253/24 gateway: 202.168.0.1

14. The IP address pool can contain addresses from more than one subnet

A. Correct

B. Incorrect

15. Which features are removed when a sophisticated tool package is uninstalled?
A. Neighbors

B.IP scan

C. Netwatch

D. LCD support

E. Ping

F. Bandwith-test

16. Which parameter on the DHCP Client is used to view the validity of the ip address …

A. Lease Time

B. Expire At

C. Leases Time

D. Expires After

Answer: D

17. What parameters are in the NAT configuration, which functions to add Address-list information
dynamically ...

A. Jump to address list

B. Add Src & Etc to Address List

C. Srcnat to address list

D. Add Source to address list

Answer: B

18. The menu options on the firewall that function to do connection tracking on the proxy are ...

A. Connection Track

B. Connection Tracking

C. Traceroute

D. Connections

Answer: D

19. Bridge is a feature that functions to combine different interfaces into one logical interface. The
following are the advantages of bridges are ...

A. Save resources and use of the device

B. Problems in one segment will create problems in all segments of the same bridge
C. Difficult to regulate broadcast traffic (eg due to viruses, etc.)

D. Increased traffic due to traffic accumulation

Answer: A

20. The following are the wireless modes that are not included on the wlan1 interface ...

A. Bridge

B. Station

C. PseudoBridge Clone Station

D. AP-Bridging

Answer: D

(25)RANGGA ELDRA RAMADHAN

1. In RouterOS queue configurations the word "total" usually represents

A. download

B. upload + download

C. download - upload

D. upload

Penjelasan: Queue merupaka konfigurasi yang digunakan untuk melimit atau membatasi Traffic

entah itu Traffic download ataupun upload. Implementasi pada Queue berdasarkan Hierarchical

Token Bucket(HTB). HTB memungkinkan untuk membuat struktur antrian hirarkis dan

menentukan hubungan antara antrian.HTB mempunyai 4 struktur yang berbeda

yaitu:global-in:mewakili semua interface masukan secara umum (masuknya antrian). Antrian

melekat global di berlaku untuk lalu lintas yang diterima oleh router sebelum packet

filteringglobal-out:mewakili semua output interface pada umumnya (egress

queue).globa-total:mewakili semua interface input dan output bersama-sama (dengan kata lain

itu adalah agregasi global-in dan global-out). Digunakan dalam kasus ketika pelanggan memiliki

batas tunggal untuk kedua, upload dan download.<Interface name>:merupakan satu antarmuka

keluar tertentu. Hanya traffic ini yang ditujukan untuk pergi keluar melalui antarmuka ini akan

melewati Queue HTB ini.

untuk lebih jelasnya kamu dapat melihatnya disini


What packages allow ROS to perform static routing?

A.system

B.routing

C.multicast

D.wireless

Penjelasan: ROS merupakan singkatan RouterOS. Static Routing sudah termasiuk kedalam

package system

3.When backing up your router by using the Export file command, the following happens:

A. Win box usernames and passwords are backed up

B. The Export file can be edited with a standard text editor after its creation

C. You are requested to give the export file a name

Penjelasan: Export file berguna untuk membackup tetapi command ini berbeda backup file jika

backup file tidak dapat dibuka lewat notepad sedangkan Export file dapat dibuka lewat notepad

Export file juga diminta untuk memberi nama filenya.

4.What is possible with Netinstall?

A. MikroTik RouterOS reinstall

B. MikroTik RouterOS configuration reset

C. MikroTik RouterOS password reset with saving router's configuration

Penjelasan: Netinstall adalah program yang berjalan pada komputer Windows yang

memungkinkan Anda untuk menginstal MikroTik RouterOS ke PC atau ke RouterBoard melalui

jaringan Ethernet. Netinstall juga digunakan untuk menginstal ulang RouterOS dalam kasus di

mana instalasi sebelumnya gagal, menjadi rusak atau password akses hilang.Netinstall juga

berfungsi untuk mereset ulang Konfigurasi.

5.Mark possible TCP states in the connection tracking table

A. New

B. Syn

C. Related

D. Invalid

E. Established
F. Closed

Penjelasan:Connection Tracking hanya ada 4 yaitu New, Related, Invalid, Established

6. What is the default protocol / port of winbox (safe)?

a. UDP / 5678

b. TCP / 8291

c. TCP / 22

d. TCP / 8080

7. In MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved by using an

address subnet of:

A./32

B./29

C./30

D./31

Penjelasan: /30 hanya mempunyai 2 host yang memungkinkan untuk dipakai.

8. Router A and B are both running as PPPoE servers on different broadcast domains of your

network. Is it possible to set Router A to use "/ppp secret" accounts from Router B to

authenticate PPPoE customers?

NO

9. So that a DHCP Client configuration does not get the gateway information automatically, what

parameters do we need to configure ...

A. Add Default Route = Active

B. Add Gateway Route

C. Add Default Route = yes

D. Add Default Route = no

Answer: D

10. Mark the queue types available on RouterOS

a. SFQ - Antimisial Stochastic Fairness

b. DRR - Round Robin Deficit

c. FIFO - First In First Out (for Bytes or for Packages)


d. LIFO - Last At First Exit

e. PCQ - Per Connection Queuing

f. RED - Random Early Detect (or Drop)

11. Network ready devices are connected directly to MikroTik RouterBOARD 750 with the

correct UTP. RJ45 functioning cable. The device is configured with the IPv4 address

192.168.100.70 by using the subnet mask 255.255.255.252. What will be a valid IPv4 address

for RouterBOARD 750 for a successful connection to the device?

a. 192.168.100.70/255.255.255.252

b. 192.168.100.69/255.255.255.252

c. 192.168.100.71/255.255.255.252

d. 192.168.100.68/255.255.255.252

12. How many IP addresses can be used in the 23-bit subnet (255.255.254.0)?

a. 512

b. 510

c. 508

d. 254

13. Is it possible that the same IP address is included in several address lists and can still be used

by some of these address lists?

a. NAT destination rules are required to utilize transparent proxy facilities

b. To deny access to certain websites, caching must be activated

c. Control the domain or server that is allowed to be cached by the proxy

d. Can deny access to certain domains or servers, but not specific web pages

14. Which of the following protocols / ports is used for SNMP. (Simple Network Management

Protocol)

a. TCP 162

b. UDP 162

c. UDP 161

d. TCP 25

e. TCP 123
f. TCP 161

15. Select the following is 'Public IP Address':

a. 192.168.0.1

b. 172.168.254.2

c. 172.28.73.21

d. 10,110.50.37

e. 11.63.72.21

16. You want to use PCQ and allow a maximum of 256k downloads and uploads for each client.

Select the correct argument value for the required queue.

A. type = pcq pcq-limit = 256000 pcq-classifier = src-address

b. type = pcq pcq-limit = 1256000 pcq-classifier = ff-address

c. type = pcq pcq-limit = 5000000 pcq-classifier = address-src

d. type = pcq pcq-limit = 5000000 pcq-classifier = ff-address

E. type = pcq pcq-limit = 256000 pcq-classifier = ff-address

17. Which option should you use when you want to prevent access from one particular address to

your router's web interface?

A. Firewall Filter Chain Forward

b. Enter the Firewall Filter Chain

c. Group settings for System users

d. WWW Services from IP Services

18.Which route will you use to reach host 192.168.1.55?

/ ip route

add defect = no distance = 1 ff-address = 192.168.1.0 / 24 gateway = 1.1.1.1

add defect = no distance = 1 ff-address = 192.168.1.0 / 25 gateway = 2.2.2.2

add defect = no distance = 1 ff-address = 192.168.0.0 / 16 gateway = 3.3.3.3

A. Route via gateway 2.2.2.2

b. Route through the gateway 1.1.1.1

c. Route through the gateway 3.3.3.3

19. Mark all the correct answers


a. The wireless access list can allow and deny access to your AP

b. Default-Forwarding can be activated for certain clients through a wireless access list

c. / ip firewall filter makes it possible to deny authentication to the AP

d. The only way to prevent wireless client connections - disable the wireless interface

20. You want to secure your RouterOS system. You don't want RouterOS to be found using

MNDP or CDP locally. You also want to reject management via MAC addresses on all

interfaces. Choose the right action to do it.

a. Remove / Deactivate all interfaces under the mac-server telnet

b. Delete / Deactivate all discovery interfaces

c. Place the right firewall rules to block mac discovery

d. Remove / Disable Interface

e. Place the appropriate firewall input rules to block mac discovery

f. Remove / Deactivate all interfaces under winbox mac-server

g. Add all the firewall rules input

(21)MUHAMMAD BINTANG SAKTYA RAMADHAN

1. What does the firewall action "Redirect" do? Select all true statements.

A. Redirects a packet to a specified port on the router ++

B. Redirects a packet to the router ++

C. Redirects a packet to a specified IP

D. Redirects a packet to a specified port on a host in the network

2. What is necessary for PPPoE client configuration?

A. ip firewall nat masquerade rule

B. Interface (on which PPPoE client is going to work) ++

C. Static IP address on PPPoE client interface

Penjelasan : untuk pppoe dipasang pada interface yang digunakan oleh si client bukan di firewall

maupun ip address

3 . MikroTik RouterOS commands can be run once a day by:

A. /system cron

B. /system watchdog
C. /system scheduler ++

Penjelasan : scheduler itu tugasnya untuk menjadwal kapan settingan itu terjadi

4. It is possible to use WPA and WPA2 authentication type at the same time with one security

profile.

TRUE

5. Netinstall can be used to

A. Keep configuration, but reset a lost admin password

B. Install package for different hardware architecture

C. Install different software version (upgrade or downgrade)++

D. Reinstall software without losing licence ++

Penjelasan : A salah karena reset tidak mungkin hanya menghilangkan password saja, dan b juga

Untuk c dan d karena fungsi netinstall adalah upgrade dan downgrade, dan juga menginstall

ulang

tanpa menghilangkan

6. The highest queue priority is

A. 16

B. 1 ++

C. 256

D. 8

7. Is it possible to limit how many clients are able to connect to an access point?

A. No it's not possible at all

B. Yes

C. Yes, but only with access-lists ++

Penjelasan : kita bisa membatasinya client yang mengakses sebuah router dengan access list jadi

yang

device nya tercantum di rule access list ia tidak akan bisa mengakses router tersebut

8. Wireless clients (mode=station) will work properly if bridged to ethernet

fALSE

Penjelasan : untuk bekerja dengan baik tidak mesti menggunakan bridge, kecuali stasion-bridge
9. The first two rules in the forward chain of the filter table are : /ip firewall filter add

chain=forward connection-state=established action=accept /ip firewall filter add chain=forward

connection-state=invalid action=drop connection-state=related packets are not filtered by the

rules above.

True++

False

10. What menu on the proxy that serves to display log information ???

A. Log

B. Service> Log

C. System> Log

D. Logging

Answer: A

11. Two Host, A, and B are connected to broadcast LAN. Select all the answer showing pairs of

IP address/mask which would allow IP connections to be established between the two hosts

a: 10.2.2.1/23 and B: 10.2.0.1/22

b: 10.1.2.192/24 and B: 10.1.2.129/26 ++

c: 10.1.2.66/25 and B:10.1.2.109/26

d: 10.2.1.0/23 and B: 10.2.0.1/22

12. Rate Flapping can be avoided by:

A. Change ap-bridge to bridge

B. Set basic rates to only one data rate like 24 Mbps

C. Choose larger channels (40 Mhz instead of 20 Mhz)

D. Reduce supported rates++

13. Which is correct masquerade rule for 192.168.0.0/24 network on the router with outgoing

interface=ether1

A. /ip firewall nat add action=masquerade chain=srcnat out-interface=ether1

B. /ip firewall nat add action=masquerade chain=srcnat ++

C. /ip firewall nat add action=masquerade out-interface=ether1 chain=dstnat

D. /ip firewall nat add action=masquerade chain=srcnat src-address=192.168.0.0/24


14. Mark possible connection states in the connection tracking table:

A. New ++

B. Invalid ++

C. Related ++

D. Syn

E. Closed

F. Established ++

15. The hotspot feature can be used only on Ethernet interfaces. You have to use a separate

access point if you want to use this feature with wireless.

Yes

No ++

16. An IP address pool can contain address from more than one subnet.

True ++

False

17. Action=redirect allows you to make?

A.Enable local service

B.Foward DNS to another device IP address

C.Transparent HTTP Proxy ++

DTransparent DNS Cache ++

18. Which queue-type is suitable for the congested environment but not functional on UDP?

a. RED ++

b. PCQ

c. BFIFO

d. PFIFO

e. SCQ

19. If the client cannot connect to the proxy on port 2 configured by the DHCP Server, what

options should we check first …

A. Check whether DHCP Server Running

B. Check DHCP IP Address Configuration on the client


C. Check Firewall Configuration

D. Check Connectivity with Mikrotik

Answer: B

20. In setting / configuring DNS Servers on proxy, what options do you need to activate so that

the proxy becomes / acts as a DNS Router …

A. Allow Remote Request

B. Cache Size

C. Cache Used

D. Servers

Answer: A

(38)YANA VALDA TSANIA VASTI

1. interface wireless access-list is use for :

A. Shows a list of clients MAC address to permit/deny registered to AP

B. Autenticate Hotspot users

C. Handles a list of clients MAC address to permit/deny connection to AP

D. Contains the security profiles settings.

Penjelasan: Access List merupakan sebuah Wireless Tool yang berguna untuk melakukan

Filtering pada AP. Access-List dapat memfilter siapa saja yang bisa connect ke AP melalui MAC

Address maupun Single-Range. Access-List terbagi menjadi 2 yaitu Extended Access-List dan

Standard Access-List. Standard Access-List memfilter menggunakan IP sedangkan Extended

Access-List memfilter menggunakan Source maupun destination IP address.

2. How many layers does Open System Interconnection model have?

A.12

B. 9

C.6

D.5

E.7

Penjelasan: Osi layer memiliki 7 model yang terbagi menjadi 2 kubu yaitu kubu Upper Layer

dan Lower Layer. Upper Layer terdapat layer Application, Presentation, dan Session. Sedangkan
Kubu Lower layer terdapat Transport, Network, Data Link, dan Physical

3.Is ARP used in the IPv6 protocol ?

FALSE

Penjelasan: Address Resolution Protokol atau biasa disebut ARP ini biasa dipakai untuk Ipv4

nah jika ARP dipakai untuk Ipv4 terus Ipv6 makenya apa dong?? kalo Ipv6 itu memakai

Neighbor Discovery Protocol atau biasa disebut NDP. NDP berguna untuk mencari node lain,

menentukan alamat node lain dan mencari Router dalam satu lapisan link.

4. The default 'target-scope' values for static routes are:

a. 30

b. 1

c. 10

d. 255

Answer: c

Penjelasan: secara default 'target-scope' pada routerOS mikrotik bernilai 10

5. Which chain firewall will be used to block MSN client traffic on the router?

a. Forward

b. Static

c. Input

d. The output

Answer: a

Penjelasan : MSN client merupakan Aplikasi Chat yang terhubung dari client menuju server

dengan melewati router. artinya trafiknya berupa Forward, karena hanya melewati.

6. Which route will be used to reach host 192.168.1.55?/ip route

add disabled=no distance=1 dst-address=192.168.1.0/24 gateway=1.1.1.1

add disabled=no distance=1 dst-address=192.168.1.0/25 gateway=2.2.2.2

add disabled=no distance=1 dst-address=192.168.0.0/16 gateway=3.3.3.3

a. Route via gateway 1.1.1.1

b. Route via gateway 3.3.3.3

c. Route via gateway 2.2.2.2


Jawaban : C

Yang digunakan /25 karena lebih spesifik

7. RouterBoard must be set so that it boots from the network (ether1), by the way, except:

A. Settings via serial console

B. Settings via the console terminal

C. Winbox

D. Mikrotik

8. How many layers does the MNDP feature work on?

A. Layer 2

B. Layer 4

C. Layer 3

D. Layer 1

9. What is the meaning of subnetting?

A. A way to separate and distribute multiple IP addresses

B. a numerical identity labeled to a device such as a computer, router or printer contained in a

computer network that uses the internet protocol as a means of communication.

C. network addresses at the data-link layer

D. Computers with network interfaces configured using TCP / IP.

10. In the RFC1918 24-bit block what IP range does it have?

A. 172.16.0.0-172.31.255.255

B. 10.0.0.0-10.255.255.255

C. 192.168.0.0-192.168.255.255

D. 255.255.0.1-255.255.255.0

11. Winbox can be obtained from, except:

A. Web www.mikrotik.com

B. Via http / web IP or MikroTik Router domain

C. Copy from storage media

D. Copy of file

12. Reset the configuration can be done by way of, except:


A. Hard Reset, physically reset.

B. Soft reset, software reset.

C. Reinstall.

D. Disabling microtic power

13. Where can we find the Network Time Protocol configuration?

A. ntp client system

B. ntp server system

C. ntp service system

D. snrc client system

14. The basic firewall in MikroTik is in the IP Firewall Filter Rule. In the firewall filter rule,

what is the default chain?

A. 2

B. 4

C. 3

D. 5

15. What is the function of the Domain Name System?

A. translate the domain name into an IP address.

B. connect many internet-connected computers using one or more IP addresses

C. security reasons, ease and flexibility in network administration.

D. synchronization of time in a network can be on a LAN (Local Area Network) or on the

internet and to synchronize the hours of a computer system over packet switching,

variable-latency data networks.

16. How many channels are there on the proxy wireless?

A. 2

B. 3

C. 6

D. 4

17. Which of the following is not the concept of connection wirelles?

A. Suitability Mode
B. Compliance with BAND

C. SSID Compliance

D. DNS suitability

18. Virtual AP is the same as AP, except:

A. Can be connected to a station / client.

B. Can be used as a DHCP server.

C. Can be used as a Hotspot server.

D. Can function as an IP address

19. Below what is not a bridge weakness?

A. Difficult to regulate broadcast traffic (eg due to viruses, etc.)

B. Problems on one port / segment will create problems on the port / segment on the same bridge

C. Increased traffic load due to accumulation of broadcast traffic

D. can only work at the Data Link layer, so there is no transmission from one protocol to

another. and bridges are also capable of supporting several protocols such as NetBEUI and LAT

that do not have to be served by routers.

20. Below what is not a tunel type in proxy is

A. PPTP

B. EoIP

C. DNS

D. SSTP

(24)NOVIA RACHMA SEKAR ADJI P

1.Which of the following protocols / port s are used for SNMP. (Simple Network Managemnt

Protocol)?

A.TCP 161

B.TCP 162

C. UDP 161

D.TCP 123

E. UDP 162

F.TCP 25
Penjelasan: SNMP atau Simple Network Management Protocol adalah protokol internet standard

yang digunakan untuk mengumpulkan dan mengorganisir informasi tentang perangkat yang

dikelola di jaringan IP dan untuk memodifikasi inforamsi yang mengubah perilaku perangkat.

Protokol bekerja pada UDP 161 dan UDP 162

2.How many usable IP addresses are there in a 23-bit (255.255.254.0) subnet?

A.510

B.254

C.508

D.512

Penjelasan: Yang dimaksud Usable IP adalah IP yang dapat dipakai di subnet 255.255.254.0

berarti soal ini menanyakan jumlah host dalam subnet 255.255.254.0 kamu dapat melihat di

dalam gambar penjelasan no 11

3.How many different priorities can be selected for queues in MikroTik RouterOS?

A. 8

B. 16

C. 0

D. 1

Penjelasan: Mikrotik memberikan priorities sebanyak 8 priorities

4.How many bits are in a subnet mask for an IPV4 network ?

A.16

B.none

C.8

D.32

Penjelasan: IPv4 menggunakan 32 bit dan membatasi ruan address sampai 4294967296 (2^32)

karena keterbatasan IPv4 ini mendorong pembuatan IPv6 pada tahun 1990-an dan secara

komersial digunakan pada tahun 2006 untuk mengetahui lebih lanjut tentang IPv4 kamu dapat

mengklik disini

5.Choose all valid hosts address range for subnet 15.242.55.62/27

A. 15.242.55.31-15.242.55.62
B. 15.242.55.32-15.242.55.63

C. 15.242.55.33-15.242.55.62

D. 15.242.55.33-15.242.55.63

Penjelasan: Jika kamu melihat gambar nomer 11 disitu dijelaskan bahwa /27 mempunyai 30 host,

1 network dan broadcast. Jika kita memulai network dari 15.242.55.0 berarti broadcastnya adalah

15.242.55.31 setelah itu kembali lagi ke network berarti network kedua dari /27 adalah

15.242.55.32 dan broadcastnya adalah 15.242.55.63 nah diantara 15.242.55.32 dan 15.242.55.63

itu adalah hostnya. Untuk menjawab soal ini kamu perlu mengerti tentang perhitungan

subnetting.

6. A data packet header is provided for the next process of framming to the next layer to be

transmitted via cable transmission media, the data packet header contains some information

including ...

A.Protocol & Port

B.Network and Subnet

C.Source Address & Destination Address

D.Network ID and Host ID

7. Following are the protocols that are generally used by several applications such as HTTP,

FTP, SSH, TELNET, to communicate are ...

A.TCP

B.UDP

C.ICMP

D.SNMP

8. Installing proxy router OS on routerboard can be done with ...

A. Installation via CD ROM

B. Installation via DNS

C. installation through a router

D. installation via netinstall

E. Installation via winbox

9. Here's how to access the proxy router, except ...


A. telnet

B. SSH

C. web based

D. winbox

E. The computer

10. Mikrotik also runs a small ISP, as an experimental medium for the development ...

A. router os software

B. hardware router

C. indoor router

D. ISP router

E. outdoor router

ANSWER: A

11. The ip web-proxy print command works to ...

A. see the results of the web-proxy configuration

B. see the results of the configuration ip address

C. see the results of the DNS configuration

D. see the results of the gateway configuration

E. see the results of the ethernet configuration

ANSWER: A

12. DHCP is an abbreviation of

A. dynamic host configuration protocol

B. dynamical host control panel

C. diamond host configuration protocol

D. dynamic host configuration protocol

E. dynamical host configuration protocol

ANSWER: A

13. A row of binary numbers from 32 bits to 128 bits is. . .

A. netmask

B. gateway
C. dns

D. ip address

E. The router

ANSWER: D

14. The definition for the area served by an 802.11 a / b / g standard wireless LAN access point

is ...

A. netmask

B. gateway

C. dns

D. ip address

E. hostpot

ANSWER: E

15. A rule / standard that regulates or permits communication links and data transfer between

two or more computer points is called ...

A. client

B. gateway

C. protocol

D. ip address

E. hostpot

ANSWER: C

16. What is the minimum hard drive that can be used to install RouterOS ...

A. 25 mb

B. 1 gb

C. 3 Gb

D. 3 kg

E. 1 Mb

ANSWER: C

17. Indonesian microtic head office is in the city ...

A. semarang
B. jakarta

C. klaten

D. jogjakarta

E. bandung

ANSWER: D

18. To create multiple rules, you can use the method ...

A. POR

B. PCQ

C. SFQ

D. IVP

E. SDF

ANSWER: B

19. What menu on the proxy that serves to display log information ???

A. Log

B. System> Log

C. Service> Log

D. Logging

20. Resetting configurations and proxy applications can be done in 3 ways (except)

A. Hard Reset

B. Soft Reset

C. Net Install

D. Flashing

(18)MUHAMMAD IVAN AULIA RAHMAN

1. Mark all correct answers: destination NAT will take place...

a. after ip firewall filter, chain forward

b. before ip firewall filter, chain forward

c. before routing decision

d. after routing decision

2. MikroTik proxy features are:


a. HTTP caching

b. POP3 caching

c. SMTP caching

d. FTP caching

e. DNS name filtering

3.

4. What protocol does PPP use to identify the Network layer protocol?

a. NCP

b. ISDN

c. HDLC

d. LCP

5. Which of the following commands will allow you to set your Telnet password on a Cisco

router?

a. line telnet 0 4

b. line aux 0 4

c. line vty 0 4

d. line con 0

6. Which protocol does DHCP use at the Transport layer?

a. IP

b. TCP

c. UDP

d. ARP

7. Which command is used to determine if an IP access list is enabled on a particular interface?

a. show access-lists

b. show interface

c. show ip interface

d. show interface access-lists

8. Where is a hub specified in the OSI model?

a. Session layer
b. Physical layer

c. Data Link layer

d. Application layer

9. What does the passive command provide to dynamic routing protocols?

a. Stops an interface from sending or receiving periodic dynamic updates.

b. Stops an interface from sending periodic dynamic updates but not from receiving updates.

c. Stops the router from receiving any dynamic updates.

d. Stops the router from sending any dynamic updates.

10. What does the command routerA(config)#line cons 0 allow you to perform next?

a. Set the Telnet password.

b. Shut down the router.

c. Set your console password.

d. Disable console connections.

11. Which statements are true regarding ICMP packets?

ICMP guarantees datagram delivery.

ICMP can provide hosts with information about network problems.

ICMP is encapsulated within IP datagrams.

ICMP is encapsulated within UDP datagrams.

a. 1 only

b. 2 and 3

c. 1 and 4

b. All of the above

12. What protocol is used to find the hardware address of a local device?

a. RARP

b. ARP

c. IP

d. ICMP

13. Which of the following protocols uses both TCP and UDP?

a. FTP
b. SMTP

c. Telnet

d. DNS

14. What is the address range of a Class B network address in binary?

a. 01xxxxxx

b. 0xxxxxxx

c. 10xxxxxx

d. 110xxxxx

15. Which of the following is private IP address?

a. 12.0.0.1

b. 168.172.19.39

c. 172.15.14.36

d. 192.168.24.43

16. Which of the following allows a router to respond to an ARP request that is intended for a

remote host?

a. Gateway DP

b. Reverse ARP (RARP)

c. Proxy ARP

d. Inverse ARP (IARP)

17. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD

model is equivalent to the Network layer of the OSI model?

a. Application

b. Host-to-Host

c. Internet

d. Network Access

18. Which of the following is the decimal and hexadecimal equivalents of the binary number

10011101?

a. 155, 0x9B

b. 157, 0x9D
c. 159, 0x9F

d. 185, 0xB9

19. Which class of IP address provides a maximum of only 254 host addresses per network ID?

a. Class A

b. Class B

b. Class C

d. Class D

20. . If you use either Telnet or FTP, which is the highest layer you are using to transmit data?

a. Application

b. Presentation

c. Session

d. Transport

(32)SATRIYO YOGA PRADANA

1.What is marked by connection-state=established matcher?

A. Packet is related to, but not part of an existing connection

B. Packet begins a new TCP connection

C. Packet does not correspond to any known connection

D. Packet belongs to an existing connection,for example a reply packet or a packet which

belongs to already replied connection

2.What wireless card can we use to achieve 100 Mbps actual wireless throughput?

A. 802.11 b/g

B. 802.11 a/b/g

C. 802.11 a

D. 802.11 a/n

E. 802.11 a/b/g/n

3.The basic unit of a physical network (OSI Layer 1) is the:

A.Header

B.Bit

C.Byte
D.Frame

Penjelasan:OSI Layer 1 bertanggung jawab dalam transmisi dan penerimaan data mentah dan

tidak terstruktur dalam media fisik (Device). Transmisi mungkin di definisikan sebagai Simplex,

half Duplex, dan Full Duplex. Protocol data unit yang digunakan OSI Layer 1 adalah Bit.

4. If an IP number is unknown in the network, a message will appear?

a. Time to Leave

b. Time for Love

c. Time With you

d. Request Time Output

e. Request time Out

5.If you need to make sure that one computer in your Hotspot network can access the internet

without Hotspot authentication, which menu allows you to do this?

A.Walled-garden

B.Users

C.IP bindings

D.Walled-garden IP

6. PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there

is a router between server and end-user host, it will not be able to create PPPoE tunnel to that

PPPoE server.

FALSE

7. Is it posible to have PPTP Client an PPTP Server on one MikroTik router at same time?

TRUE

8. The service that automatically gives an IP number to the computer that requests it is

a. TCP

b. IP

c. Server

d. Statis

e. DHCP

9. Switchport mode is
a. The command used in creating VLANs

b. The command used to exit

c. The command used for trunking

d. Answers a and b are correct

e. There is no correct answer

10. The function of "show vlan brief" is

a. to display options

b. to give an answer

d. to backup the configuration

e. for easy configuration

11. Hostname function for

a. house name

b. change the switch name

c. change the name of the road

d. to give the code

e. there is no right answer

12. In order to configure the switch we can use the menu ..

A. CLI

B. Config

C. Desktop

D. Physical

E. Service/Software

13. To activate the word secret in the enable command is a function of.

A. Configure Terminal

B. Enable Secret

C. Enable Password

D. Hostname

E. Do show vlan

14. To connect the console cable to the PC administrator you should use the port ..
A. FastEthernet

B. RS 232

C. HDMI

D. USB

E. Telepon

15. ipv4 consists of ... id and ... id

A.Net and host

B.net and ware

C.net and bus

D.host and domain

E.ip and Ma

16. to limit access to vlan we need to use the command

A. IPCONFIG

B.PING

C. Enable password

D. trunking

E. Switch mode access

17. 192.168.90.1 is the class ip

AE

B.D

C.C

D.B

E.A

18. Class B range on IPV4 is =

A.224-239

B.0-127

C.128.191

D.1-126

E.240-225
19. What is a Bottleneck?

a. A media access control (MAC) method used by Ethernet network technology.

b. A situation where there is an ip that creates a bandwidth band.

c. Measured with a certain time unit and the network conditions used to transfer files of a certain

size.

d. The process of delivering a broadcast through an electronic device called a transmitter or

transmitter is then received by the broadcast receiver through a broadcast receiver called a

receiver.

e. Narrowing of Paths

20. Factors that influence Bandwidth and Throughput, except ...

a. Data type transferred

b. Network Topology

c. The number of network users

d. Electricity and weather induction

e. Narrowing of the path

(36)SIYAMBAHNA IKHWAN

1.Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,

and it's a driver issue ?

No

2.Possible actions of ip firewall filter are:

A.Accept

B.Add-to-address-list

C.Bounce

D.Tarp

E.Tarpit

F.Log

3.You have 802.11b/g wireless card. What frequencies are available to you?

A.2327MHz

B.5210MHz
C.2412MHz

D.2422MHz

E.5800MHz

4.NStreme works only on 40mhz Channel width

False

Penjelasan: Nstreme tidak hanya bekerja pada Channel 40 Mhz, NStreme juga bekerja pada

Channel 20 Mhz, dan 10 Mhz. Channel default dari NStreme adalah 20 Mhz.

5.What Letter appear next to route, which is automatically created by ROS (RouterOS) when

user adds a valid address to an active interface?

A.C

B.A

C.I

D.D

E.S

6. Configuration action on NAT that functions to configure with the aim to change private ip into

public ip is

A. Redirect

B. Accept

C. Masquerade

D. Etc.-Nat

Answer: C

7. The following are not included in the type options on Hotspot> IP Binding on proxy is ....

A. Bypassed

B. Regular

C. Blocked

D. Filtering

Answer: D

8.Action on filter rules that serves to register website addresses that have been accessed by

clients on the address list dynamically is


A. Add etc. to the address list

B. Add src to address list

C. Add src to address

D. Add etc. to address

Answer: B

9.Packet Flow Filter Rules that enter a router are known as ...

A. Chain = forward

B. Chain = status

C. Chain = output

D. Chain = input

Answer: D

10.The backup / restore feature can be done by uploading backup data to the proxy, so that it is

stored on the storage / storage media for the proxy, uploading the backup file can be done in

various ways, except ....

A. Upload via FTP

B. Drag / Drop through the browser

C. Copy / Paste via winbox

D. Drag / Drog through the browser

Answer: D

11. What is the difference between a user with write and full access on a proxy ???

A. Full & Write has full access rights in the system, and Write can only configure the ip address

B. Full has full access rights to the system, and Write simply cannot reboot, and the addition of

new users

C. Have the same access rights

D. Full has full access rights in the system, as well as Write, but write cannot read

Answer: B

12.To configure remote access services and ports on a proxy, if you want to change port 80:

www to port 81: www, then the command is ???

A.> ip services set http port = 81


B.> ip service set www port = 81 disable = no

C.> ip service set www port = 81

D.> ip service edit www port = 81

Answer: C

13.Which of the following is not included in the action options in Firewall> Microtic Filters ...

A. Passtrough

B. Return

C. Tarpit

D. Jumping

Answer: D

14.Bandwidth management works with an algorithm that will share bandwidth evenly among a

number of active clients, this bandwidth management is known as ...

A. PCQ

B. FIFO

C. SFQ

D. RED

Answer: A

15.The development of the proxy is currently growing rapidly, the proxy can play a role in any

device in the network ranging from routers, bridges, switches, access points, CPE, servers, etc.

The following are the server features on the proxy is ...

A. Radius Hotspot

B. Firewall

C. Routing

D. Bridging

Answer: A

16.The firewall option on the proxy whose job is to create a user log that often pings the router is

...

A. Ip firewall filter add chain = forwardprotocol = icmp action = log

B. Ip firewall filter add chain = input protocol = icmp action = log


C. Ip firewall filter add chain = input action = log

D. Ip firewall filter chain = input protocol = icmp action = log

Answer: C

17.The backup and restore process, can be done through storage stored on proxy memory, this

menu can be accessed via ...

A. File

B. Remote

C. Disk

D. Hard drive

Answer: A

18.Mikrotik Routerboard does not have a CMOS / battery feature so that the timing of errors

often occurs, so the solution for configuring time on the proxy is automatically saved is using the

NTP Client, on the menu whether we configure NTP

A. NTP Client

B. NTP Service

C. SNTP Client

D. SNTP Server

Answer: C

19.How to handle packet storming & Bridge Loops that occur on bridge networks is .....

A. Routing

B. None

C. Settings

D. RSTP

Answer: D

20.Scanner feature on wireless that serves to detect wireless around what is active, what mode

should be used by wireless

A. Pseudo-bridge

B. Bridge

C. Ap-bridge
D. Station

Answer: D

(03)BAYU AJI SANTOSO

1.If ARP=reply-only is configured on an interface, what will this interface do

A. Add new IP addresses in /ip arp list

B. Accept all IP/MAC combinations listed in /ip arp as static entries

C. Add new MAC addresses in /ip arp list

D. Accept all IP addresses listed in /ip arp as static entries

E. Accept all MAC-addresses listed in /ip arp as static entries

2. How long is level 1 (demo) license valid?

A. 24 hours

B. Infinite time

C. 1 month

D. 1 year

3. A PC with IP 192.168.1.2 can access internet, and static ARP has been set for that IP address

on gateway. When the PC Ethernet card failed, the user change it with a new card and set the

same IP for it. What else should be done?

a. Old static ARP entry on gateway has to be updated for the new card

b. Nothing - it will work as before

c. MAC-address of the new card has to be changed to MAC address of old card

d. Another IP has to be added for Internet access

4. If a packet comes to a router and starts a new, previously unseen connection, which

connection state would be applied to it?

A. new

B. established

C. unknown

D. invalid

E. no connection state would be applied to such packet

5. Why is it useful to set a Radio Name on the radio interfaces?


A.To identify a station in a list of connected clients

B.To identify a station in the Access List

C.To identify a station in Neighbor discovery

6. What is MAC Address

a. Logical Address

b. Physical Address

c. System Address

d. Unidentified Address

e. Identified Address

7. What is IP Address

a. Logical Address

b. Physical Address

c. System Address

d. Unidentified Address

e. Identified Address

8. RB751 that is code at mikrotik. What does mean RB7 code?

a. Router class

b. Number of wireless port

c. Number of ethernet port

d. Number of gigabit port

e. Number of channel

9. RB751 that is code at mikrotik. What does mean 5 code?

a. Router class

b. Number of wireless port

c. Number of ethernet port

d. Number of gigabit port

e. Number of channel

10. RB751 that is code at mikrotik. What does mean 1 code?

a. Router class
b. Number of wireless port

c. Number of ethernet port

d. Number of gigabit port

e. Number of channel

11. What is the meaning of OSI?

a. Open System International

b. Open Security International

c. Open Security Interconnection

d. Open System Interconnection

e. Open Security Impact

12. What port telnet is?

a. 21

b. 23

c. 25

d. 80

e. 110

13. What port FTP is?

a. 21

b. 23

c. 25

d. 80

e. 110

14. What port HTTP is?

a. 21

b. 23

c. 25

d. 80

e. 110

15. How much BIT does IPv4 have?


a. 16

b. 32

c. 64

d. 128

e. 256

16. How much BIT does IPv6 have?

a. 16

b. 32

c. 64

d. 128

e. 256

17. Which one is the private IP?

a. 10.23.13.1

b. 172.40.10.3

c. 192.168.90.20

d. 172.15.90.1

e. 11.12.13.14

18. Which one is the public IP?

a. 10.23.13.1

b. 172.40.10.3

c. 192.168.90.20

d. 172.15.90.1

e. 11.12.13.14

19. What is firewall function?

a. Network protection

b. For connect to the internet

c. Virus destroyer

d. Route the different network

e. Protect the router from external error


20. What is the function of Address-List?

a. Give DHCP IP for PC

b. Give Static IP for PC

c. Used for filet IP address group with 1 firewall rule

d. For routing different network

e. IP list from firewall rule with function “add to addresslist”

(23)MUHAMMAD FIQRI HERMANSYAH

1.Mark correct statements about Backup Files

A. Export files are not editable

B. Backup files are not editable

C. Backup files are editable

2. For static routing functionality, additionally to the RouterOS 'system' package, you will also

need the following software package:

A. dhcp

B. no extra package required

C. routing

D. advanced-tools

Penjelasan: Static Route tidak menggunakan Package

3. For user in local ppp secrets/ppp profiles database, it is possible to

A. Allow only pppoe login

B. Deny services (like telnet) only for this user or for one group of users

C. Set max values for total transferred bytes (up- and download)

D. Allow/deny use of more than one login by this user

E. Allow login by pppoe and pptp, but deny login by l2tp

4. Choose all valid hosts address range for subnet 15.242.55.62/27

a. 15.242.55.31-15.242.55.62

b. 15.242.55.33-15.242.55.63

c. 15.242.55.33-15.242.55.62

d. 15.242.55.32-15.242.55.63
5. Mark all statements that are true about / export (rsc file).

Export log from / log print

Export full configuration from router

Export only part of configuration (for example / ip firewall)

Export scripts from system scripts / Export files cannot be edited

What wireless cards can we use to achieve 100 Mbps of actual wireless throughput?

A. 802.11 b / g

B. 802.11 a / b / gc. 802.11 a

C. 802.11 a / n

D. 802.11 a / b / g / n

6. MAC layer by OSI model is also known as

A.Layer 2

B.Layer 1

C.Layer 6

D.Layer 7

E.Layer 3

7. Is it possible that the same IP address is included in multiple address lists and still be used by

these multiple address lists?

a. Destination NAT rule is required to utilize transparent proxy facility

b. To deny access to a specific website, caching should be enabled

c. Controls domains or servers which are allowed to cache by Proxy

d. Can deny access to a specific domains or servers, but not specific web pages

8. A network ready device is directly connected to a MikroTik RouterBOARD 750 with a correct

U.T.P. RJ45 functioning cable. The device isconfigured with an IPv4 address of 192.168.100.70

using a subnet mask of 255.255.255.252. What will be a valid IPv4 address for

theRouterBOARD 750 for a successful connection to the device?

A.192.168.100.69/255.255.255.252

B.192.168.100.70/255.255.255.252

C.192.168.100.71/255.255.255.252
D.192.168.100.68/255.255.255.252

9. Select valid MACaddress

A.G2:60:CF:21:99:H0

B.00:00:5E:80:EE:B0

C.AEC8:21F1:AA44:54FF:1111:DDAE:0212:1201

D.192.168.0.0/16

10. Which computers would be able to communicate directly (without any routers involved):

A.192.168.17.15/29 and 192.168.17.20/28

B.10.5.5.1/24 and 10.5.5.100/25

C.10.10.0.17/22 and 10.10.1.30/23

D.192.168.0.5/26 and 192.168.0.100

11. How many layers does Open Systems Interconnection model have?

A.6

B.9

C.5

D.7

E.12

12. How many usable IP addresses are there in a 20bit subnet?

A.4096

B.4094

C.2046

D.2048

E.2047

13. Choose correct statements for MikroTik proxy.

a. Destination NAT rule is required to utilize transparent proxy facility

b. To deny access to a specific website, caching should be enabled

c. Controls domains or servers which are allowed to cache by Proxy

d. Can deny access to a specific domains or servers, but not specific web pages

14. Collisions are possible in fullduplex. Ethernet networks


False

15. In MikroTik RouterOS, Layer3 communication between 2 hosts can be achieved by using an

address subnet of :

A./31

B./29

C./32

D./30

16. Which of the following are valid IP addresses?

A.10.10.14.0

B.192.168.256.1

C.192.168.13.255

D.1.27.14.254

17. How many IP addresses can one find in the header of an IP packet?

A.4

B.2

C.3

D.1

18. Select all valid host addresses for subnet 15.242.55.62/27

A. 15.242.55.31-15.242.55.62

B. 15.242.55.32-15.242.55.63

C. 15.242.55.33-15.242.55.62

D. 15.242.55.33-15.242.55.63

19. Which is the correct incognito rule for 192.168.0.0/24 networks on routers with outgoing

interface = ether1?

a. / ip firewall nat add action = incognito chain = srcnat

b. / ip firewall nat add action = incognito chain = srcnat src-address = 192.168.0.0 / 24

c. / ip firewall nat add action = masquerade out-interface = ether1 chain = dstnat d. / ip firewall

nat add action = incognito chain = srcnat out-interface = ether1

20. Router OS can set the vlan-id value from - to:


a. 1-2048

b. 1-2049

c. 1-4096

d. 1-4095

(09)FAIZAL RISSA

1.What is term for the hardware coded address found on an interface?

a. IP Address

b. Interface Address

c. MAC Address

d. FQDN Address

jawab:c

2. Please select valid scan-list values in interface wireless configuration:

a. 5560,5620-5700

b. 5640~5680

c. default,5560,5600,5660-5700

d. 5540,5560,5620+570

jawab:a,c

3. Simple Queue number 0 defines 2M for upload and download for target IP 10.10.0.33.

Simple Queue number 1 defines 4M for upload and download for target IP 10.10.0.33. Client

10.10.0.33 is be able to obtain

A. 2M upload/download

B. 4M upload/download

C. 0M upload/download

D. 6M upload/download

jawab:a

4. You would like to allow multiple logins with one user name on a HotSpot server. How should

this be configured?

a. Set "Shared Users" option at /ip hotspot user profile

b. It's not possible


c. Set "Shared Users" option at /ip hotspot

d. Set "only-one=no' at /ip hotspot

jawab:a

5. What menus should be used to allow certain websites to be accessed from behind a hotspot

interface, without client authentication

a. ip hotspot ip-binding

b. ip hotspot profile

c. ip hotspot walled-garden

d. ip hotspot walled-garden ip

jawab:c

6. How many last ip can be used on 208.10.12.33/28

A. 208.10.12.48

B. 208.10.11.46

C. 208.10.12.46

D. 208.10.12.47

Answer Key: D

7. Which are the valid host IDs at 178.167.10.234/29

A. 178.167.10.231

B. 178.167.10.238

C. 178.167.10.236

D. 178.167.10.233

Answer Key: A

8. What is the host ip range from 10.20.30.40/27

A. 10.20.30.32 - 10.20.30.62

B. 10.20.30.33 - 10.20.30.62

C. 10.20.30.33 - 10.20.30.61

D. 10.20.30.32 - 10.20.30.61

Answer Key: B

9. What is the right ip network for ip 12.13.13.15/20


A. 12.13.0.0

B. 12.13.13.0

C. 12.13.12.0

D. 12.12.13.0

Answer Key: A

10. What is the right ip network for ip 12.13.13.15/20

A. 12.13.0.0

B. 12.13.13.0

C. 12.13.12.0

D. 12.12.13.0

Answer Key: A

11. What are the two main types of access control lists (ACLs)?

Standard

IEEE

Extended

Specialized

a. 1 and 3

b. 2 and 4

c. 3 and 4

c. 1 and 2

JAWAB : A

12. What flavor of Network Address Translation can be used to have one IP address allow many

users to connect to the global Internet?

a. NAT

b. Static

c. Dynamic

d. PAT

JAWAB : B

13. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?


a. A

b. B

c. G

d. N

JAWAB : C

14. What PPP protocol provides dynamic addressing, authentication, and multilink?

a. NCP

b. HDLC

c. LCP

d. X.25

JAWAB : C

15. Which includes external commands on DOS are ...

a. MD

b. CHKDSK

c. DIR

d. CLS

Reason: b). CHKDSK is an external command that functions as checking the free capacity of our

HDD, besides that we can also find out if there is a Bad Sector.

16. Processor Intel Core I7 uses a socket processor with type ...

a. LGA 1156

b. LGA 775

c. AM2 +

d. Socket T

Reason: a). LGA 1156 is a processor socket that can be used by processors such as Core I3, I5,

I7. Beep 3 times when you turn on the PC indicates ...

a. Error on VGA

b. Memory error

c. NIC error

d. Buzzer error
Reason: a). Errors on VGA are usually indicated by the beep 3 times.

18. Programs that can be used to create a file in the form of a presentation are ....

a. VM Ware

b. Macromedia Flash

c. Adobe Photoshop

d. Microsoft Power Point

Reason: d). Microsoft Power Point is one of the programs in Microsoft Office that functions as a

data / file maker in the form of a presentation.

19. On the Debian operating system, the command that we can use to view directory contents is

...

a. LS

b. CLEAR

c. NANO

d. MKDIR

Reason: a). LS is a command in Linux Debian to view the contents of a directory.

20. To create a partition in Windows 98, we can type the command in the form ...

a. DIR

b. MKDIR

c. FDISK

d. IPCONFIG

Reason: c). FDISK is an external command on SO Windows that serves as the initial ground for

creating partitions.

(31)SALVIA DYAH KURNIASARI

1.Mark all correct Statement about /export (rsc file)

A.Exports logs from /log print

B.Exports full configuration of the router

C. Exports only part of the configuration (for example /ip firewall)

D.Exports scripts from /system script

E.Exports files could not edited


2.Which default route will be active?

A. /ip route

B. add disabled=no distance=10 dst-address=0.0.0.0/0 gateway=1.1.1.1

C. add disabled=no distance=5 dst-address=0.0.0.0/0 gateway=2.2.2.2

D. Route via gateway 1.1.1.1

E. .Route via gateway 2.2.2.2

3.You need to reboot a RouterBoard after importing a previously exported rsc file to activate the

new configuration.

TRUE

4. What Letter(s) appear next to route, which is automatically created by ROS (RouterOS) when

a user adds a valid address to an active interface?

A. I

B. D

C. A

D. S

E. C

5. Which are a necessary section in /queue simple to set bandwidth limitation?

A. Target-address, max-limit, dst-address

B. Max-limit

C. Target-address, dst-address

D. Target-address, max limit

6. Select who founder from mikrotik

A.john trully

B.j.j thomson

C. Arnis Reikstins

7. What is port of www

A.22

B.80

C. 21
8. FTP connect in layer

A.2

B.3

9. Are winbox need Ip ???

A. Yes

B. No

10. What function from API ???

A. Connect to OS windows

B. Connector Serial Cable

C.Socket Programming

11. port 80 is used for service.....

A.FTP

B.SSH

C.telnet

D.HTTP

12. How many IP in prefix /26 ?

A.32

B.4

C.64

D.8

13. Is ssh more secure than telnet?

Yes

No

14. Select how we can get winbox

A.www.mikrotik.com

B.http/web ip

C.www.google.com

15. what is the password admin user on the router in default mode?

A.0
B.admin

C.default

D. Blank

16. How many total port host ?

A.65525

B.65535

17. Port 1024 until 49151 is used to...

A.well-known ports

B.registered port

C.dynamic port

18. Is ip address for logical pc addressing ??

True

False

19. Http or web connect with layer

A. 1

B. 2

C. 3

20. what is the username on the router in default mode?

A.admin

B.router

C.mikrotik

(35)SHENYA KAMESWARI P.A

1. Which option in configuration of a wireless card must be disabled to make router to permit

only known clients listed in the access list to connect?

a. Default Forward

b. Enable Access List

c. Default Authenticate

d. Security Profile

2. What is the default protocol/port of (secure) winbox?


a. TCP/8080

b. TCP/22

c. UDP/5678

d. TCP/8291

3. What kind of users are listed in the Secrets window of the PPP menu?

a. L2TP users

b. PPPOE users

c. Hotspot users

d. PPTP users

e. Winbox users

f. Wireless users

4. You plan to migrate from wireless links using 802.11a at 5GHz (without nstrem) to those

using Nv2 at 5GHz. If you change the AP from 802.11a to Nv2, you don't want the client to

release it for more than a few seconds during the upgrade.

Assuming the client is able to operate with Nv2 (the correct hardware, encryption key and the

correct version of ROS), the settings for 'wireless protocol' must be enabled on the client so that

the client can automatically detect the protocol used by the AP and continue to connect with

802.11a or Nv2: (select all that apply)

a. Nv2

b. nv2-nstreme-802.11

c. anything

d. not determined

5. Is it possible to have PPTP Client and PPTP server on one MikroTik router at the same time?

True

6. What does this simple queue do (see the picture)?

a. Host queue limit 192.168.1.10 uploads data rate to one megabit per second.

b. Queue guarantees data download speeds of one megabits per second for hosts 192.168.1.10

c. Queue guarantees a data upload rate of one megabit per second for hosts 192.168.1.10

d. Queues limit host 192.168.1.10 downloading data rate to one megabit per second.
7. In Winbox, Hide Unchecked Password shows keywords for the following

a. RouterOS Users

b. Hotspot users

c. RADIUS shares secrets

d. The Secret of PPP

8. Which choice should you use when you want to prevent access from one particular address to

your router's web interface?

a. Firewall Filter Chain Forward

b. Enter the Firewall Filter Chain

c. Group settings for System users

d. WWW Services from IP Services

9. Which of the following prevents unknown clients from connecting to your AP? Choose the

BEST answer.

a. Check the "Do not allow unknown clients" box in the wireless configuration

b. Uncheck "Default Authenticate" on the wireless card configuration, and add each known client

MAC address to your access list configuration which ensures that you enable "authentication" on

the entry

c. Adding each known client MAC address to your access list configuration is the only step

required

d. Uncheck "Default Authenticate" on the wireless card configuration, and add each known client

MAC address to your connection list configuration

e. Configure the radius server under "/ radius"

10. Can you add the driver manually to RouterOS if your PCI Ethernet card is not recognized,

and you suspect it is a driver problem?

a. yes

b. No

11. After entering this rule: / ipfirewall add chain = input action = drop, you can still access the

Router using the mac-address.

yes
no

12.

13. Where can you monitor (see addresses and ports) the real-time connections processed by the

router?

a. Queue Tree

b. Torch tool

c. Firewall counter

d. Firewall Connection Tracking

14. Action = redirect applies to

a. SRC-NAT Rules

b. DST-NAT rules

c. Firewall Filter Rules

d. Route rules

15. When viewing a route (gateway) in Winbox, some routes (gateway) will display "DAC" in

the first column. This flag means:

A. Direct, Available, Connected

B. Dynamic, Available, Created

C. Dynamic, Active, Connected

D. Dynamic, Active, Console

16. The PPPoE server only works in one Ethernet broadcast domain that is connected to it. If

there is a router between the server and the end-user host, it will not be able to create a PPPoE

Tunnel to the PPPoE server.

False

17. Which configuration menu should you use to change the default Winbox router port?

A. / system resource

B. / ip firewall filter

C. / ip service

D. / ip firewall service-ports

18. The maximum maximum limit (Max-limit) under Simple Queues will limit the upload and
download combined from the target address of your simple queue.

True

19. To use dynamic keys in your wireless security profile for an AP, you MUST set up a dhcp

server to provide dynamic keys

False

20. How many different priorities can be chosen for Queues (queues) on MikroTik RouterOS?

A. 1

B. 8

C. 0

D. 16

(12)INTHANIA NADICIKA K

1.The network address is

A.The last address of the subnet

B.The first address of the subnet

C.The first usable address of the subnet

2. Which of the following IP addresses are publicly routable?

A.127.34.155.3

B.192.168.1.4

C.11.3.10.4

D.172.16.13.23

Penjelasan:IP Public adalah IP address yang digunakan untuk lingkup internet, host yang

menggunakan IP public dapat diakses oleh seluruh user yang tergabung diinternet baik secara

langsung maupun tidak langsung (melalui proxy/NAT). Ip PRIVATE ada 3blok yaitu:

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)

172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)

192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)

Selain itu, IP Public

3. Router has Wireless and Ethernet client interfaces, all client interfaces are bridged. To create a

DHCP service for all clients you must configure DHCP server on
A. only on bridge interface

B. every bridge port

C. DHCP service is not possible in this setup

D. Ethernet and wireless interfaces

4. A routing table has following entries:

A.0 dst-address=10.0.0.0/24 gateway=10.1.5.126

B.1 dst-address=10.1.5.0/24 gateway=10.1.1.1

C.2 dst-address=10.1.0.0/24 gateway=25.1.1.1

D.3 dst-address=10.1.5.0/25 gateway=10.1.1.2

5. Which gateway will be used for a packet with destination address 10.1.5.126?

A. 10.1.1.1

B. 10.1.1.2

C. 10.1.5.126

D. 25.1.1.1

6. We have two radio cards in a point-to-point link with settings:

Card Nr 1.: mode=ap-bridge ssid="office"

frequency=2447 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes

security-profile=wpa

Card Nr 2.: mode=station ssid="office"

frequency=2412 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes

security-profile=wpa2

Is Card Nr2. able to connect to Card Nr 1.?

A. Yes, if Nstreme is enabled or disabled on both

B. Yes, when security profile settings are compatible with each other and Nstreme is enabled or

disabled on

both

C. No, because of the different frequencies

D. No, because of the different security profiles

Correct Answer: B
7. When backing up your router by using the 'Export' command, the following happens:

A. Winbox usernames and passwords are backed up

B. The Export file can be edited with a standard text editor after its creation

C. You are requested to give the export file a name

Correct Answer: B

8. In Ip Firewall NAT, you can Classify Traffic in SRC Nat Chain based on " in-interface".

False

9. Which default route will be active? /ip route add disabled=no distance=10

dst-address=0.0.0.0/0 gateway=1.1.1.1 add disabled=no distance=5 dst-address=0.0.0.0/0

gateway=2.2.2.2

A. Route via gateway 1.1.1.1

B. Route via gateway 2.2.2.2

10. Which software version can be installed onto the following RouterBoard types?

A. Routeros-x86-x.xx.npk on a RB1100

B. Routeros-mipsbe-x.xx.npk on a RB133

C. Routeros-mipsle-x.xx.npk on a RB133

D. Routeros-powerpc-x.xx.npk on a RB333

E. Routeros-mipsbe-x.xx.npk on a RB433

11. It is impossible to delete admin user on user table MikroTik.

A. True

B. False

12. Which features are removed when advanced-tools packages are uninstalled?

A. Neighbors

B. Ip-scan

C. Netwatch

D. LCD support

E. Ping

F. Bandwith-test

13. A proxy that is backed up through the File menu on the Winbox, if not given a name /
identity then by default it will use the name ...

A. Backup Date

B. Identity - Date, and Time

C. Identity

D. Unknown backup

Answer: B

14. The IF Principle ... THEN ...

• IF (if) the packet meets the criteria that we make.

• THEN (then) what action will be performed on the packet

A. TRUE

B. FALSE

15. feature to record (display in the log) activities that we want the network

a. firewall loging

b. firewall defender

c. firewall strategy

16. the ability to view connection information such as source and destination IP and port being

used, connection status, protocol type, etc.

a. Address list

b. Block account

c. connection tracking

17. There are two types of NAT in the MikroTik Firewall

source NAT or srcnat -> applies to packets originating from NAT-based networks (private / local

network)

destination NAT or dstnat -> applies to packets going to the NAT network, usually used to

access from outside services on the network.

A. TRUE

B. FALSE

18. The default configuration of a proxy is as follows:


ether 1: dhcp client

bridge 1: ether2-ether3-ether4-ether5, etc.

ip address bridge: xxx.xxx.xxx.xxx.xxx

dhcp server: bridge 1

NAT = yes

What is the bridge IP address interface in the default configuration ???

a. 192.168.88.1/24

b. 192.168.88.0/24

c. 192.168.10.1/24

d. DHCP Client

19. If you notice any changes in the color of the Queue rule icon. what the red queue rule means

is ...

a. Bandwidth usage is normal

b. Bandwidth usage of 0-50%

c. Bandwidth usage 51-75%

d. 76-100% bandwidth usage

20. What tools are used to check bandwidth traffic between proxy routers?

A. Telnet

B. Bandwidth

C. Test Packet Sniffer

D. Speedtest

Answer: B

(02)ANTONIO EKA WADU DJAWA

1.Action=redirect is applied in

A. chain=srcnat

B. chain=dstnat

C. chain=forward

JAWAB : B

2. Mark all correct statements about /export (rsc file).


A. Exports logs from /log print

B. Exports full configuration of the router

C. Exports only part of the configuration (for example /ip firewall)*

D. Exports scripts from /system script*

E. Exports files could not edited

3. The routing table has the following entries:

A.0 dst-address = 10.0.0.0 / 24 gateway = 10.1.5.126

B.1 dst-address = 10.1.5.0 / 24 gateway = 10.1.1.1

C.2 dst-address = 10.1.0.0 / 24 gateway = 25.1.1.1

D.3 ff-address = 10.1.5.0 / 25 gateway = 10.1.1.2

4. Which gateway will be used for packets with the destination address 10.1.5.126?

A. 25.1.1.1

B. 10.1.1.2

C. 10.1.5.126

D. 10.1.1.1

5. Which of the following is used in 802.11 standard wireless networks?

A. FDD

B. CSMA / CA

C. CDMA

D. CSMA / CD

6. Mark all correct statements about / export file = {name of an rsc file}.

A. Exports files which can not be edited

B. Export full configuration of the router (without RouterOS user passwords)

C. Exports logs from / log print

D. Exports only part of the configuration (for example / ip firewall)

7. RouterOS log messages are stored on disk by default :

False

8. Possible IP firewall filter actions are:

A. log
B. tarp

C. bounce

D. accept

E. Add-to-list

F. tarpit

9. What firewall actions do "Redirect"? Select all statements that are true

A. Redirects a packet to a specified port on the router (Switches packets to a specific port

on the router)

B. Redirects a packet to a specified IP

C. Redirects a packet to the router

D. Redirects a packet to a specified port on a host in the network

10. Which port does PPTP use by default?

A. UDP 1721

B. TCP 1723

C. UDP 1723

D. TCP 1721

11. How many DHCP servers can be configured per interface on RouterOS?

A. Two

B. One

C. Unlimited

D. Five

12. What are the correct facts about file backups?

A. Includes files stored in / file

B. Could die

C. Includes username and password from / user

D. Covers the entire router configuration

13. NStreme only works on 40mhz Channel width

A. Correct

B. Incorrect
14. To make all DNS requests come from your network to complete them on your router

(regardless of client configuration), which actions will you specify for the DST-NAT rule?

A. Disguised

B.Dst-nat

C. You cannot use DST-NAT to achieve it

D. Transfer

15. The first two rules in the forward chain from the filter table are: / ip firewall filter add chain

= forward connection-state = specify action = accept / ip firewall filter add chain = forward

connection-state = invalid action = dropconnection-state = related packet not filtered by the rules

above

A. Correct

B. Incorrect

16. The wireless access list interface is used for

A. Shows a list of Client's MAC addresses that are already registered with the AP

B. Hotspot user authentication

C. Handling the Client's MAC Address list to allow / deny connections to the AP

D. Contains the profile security settings

17. If the router login password is lost, need to reinstall RouterOS or use the hardware reset

function.

A. Correct

B. Incorrect

18. Possible IP filter firewall actions are:

A. Tharpite

B.Tarp

C.Bull

D. Add-to-address-list

E. Log

F. Receive

19. Which version of software can be installed on the following RouterBoard types?
A.Routeros-x86-x.xx.npk on RB1100

B.Routeros-mipsbe-x.xx.npk on RB133

C.Routeros-mipsle-x.xx.npk on RB133

D.Routeros-powerpc-x.xx.npk on RB333

E.Routeros-mipsbe-x.xx.npk on RB433

20. Secret PPP is used for

A. L2TP Client

B. Router Users

C. PPTP Clients

D. PPP Clients

E. IPSec Clients

F. PPPoE Client

(14)FAREL BAGASKARA S.W

1. How many usable IP addresses are there in a 20-bit subnet?

[single answer]

a. 2047

b. 4096

c. 2048

d. 2046

e. 4094

JAWAB : E

2. What is the default TTL (time to live) on a router that an IP packet can experience before it

will be discarded ?

[multiple answers]

a. 60

b. 30

c. 1

d. 64

JAWAB : A,B,D (ga yakin)


3. Which ones of the following are valid IP addresses?

[multiple answers]

a. 192.168.13.255

b. 1.27.14.254

c. 10.10.14.0

d. 192.168.256.1

JAWAB : B,C

4.add chain=dstnat in-interface=ether1 protocol=tcp dst-port=3389 action=dst-nat

to-address=192.168.1.2 to-ports=81

The command shown above

a. Adds IP address 192.168.1.2 to the interface ether1

b. Forwards any TCP traffic incoming through ether1 port 3389 to the port 81 of the internal host

192.168.1.2

c. Forwards all TCP traffic from 192.168.1.2 to port 81 of the interface ether1

d. Forwards any TCP traffic incoming through ether1 port 81 to the port 3389 of the internal host

192.168.1.2

Jawab:b

5. What protocol does ping use?

[single answer]

a. UDP

b. TCP

c. ARP

d. ICMP

JAWAB : D

6.The following is what parameters we need to do when wanting to configure email tools on the

proxy winbox, except ???

A. Subject

B. Start TLS

C. Port
D. Server

Answer: A

7.What parameters do we need to set in the Netwatch tool to identify a host in the Down /

Inactive state ...

A. Interval

B. Timeout

C. Request Time Out

D. Since

Answer: B

8.What tools are used to display information about graphic statistics of cpu resource usage,

memory, and bandwidth usage on several interfaces ???

A. Graphing

B. Graph

C. Graphs

D. Statistics

Answer: A

9.The following are the direction options on the bandwidth test tools on the proxy winbox that

function to regulate the sending and receiving bandwidth methods, are ...

A. Up / Down

B. Tx / Rx

C. Send / Receive

D. Upload / Download

Answer: C

10.What tools are used to scan active IP address information on a local area network interface /

network?

A. IP Scanner

B. IP Scan

C. IP Scanner

D. Network Scanner
Answer: B

11.Which queue-type is suitable for the congested environment but not functional on UDP?

A. SCQ

B. PCQ

C. FIFO

D. RED

Answer : D

12.Which is a default baud-rate of currently manufactured RouterBOARDs?

A. 3128

B. 115200

C. 8291

D. 11520

Answer : B

13.Which option should you use when you want to prevent access from one specific address to

your router's web interface?

A. Group settings for System users

B. Input Firewall Filter Chain

C. Advanced Firewall Filter Chains

D. WWW Services from IP Services

Answer: B

14.PPP Secret is a security method on microtic, PPP Secret can be used in the following

Tunneling, except ....

A. L2TP

B. PPPoe

C. OVPN

D. SSTP

Answer: C

15.It is possible to access MikroTik Graphs on a different port than HTTP port 80

a. Yes
b. No

16.In the wireless menu do we access information about the number of clients connected to the

proxy ????

A. Registration

B. Security Profile

C. Connection List

D. Access List

Answer: A

17.VTY is abbreviation of..?

a. Virtual Teletype

b. Virtual To YOU

c. Virtual Time Yours

d. Vlan To Young

e. Virtual Time Young

18.Ping is abbreviation of..?

a. pure interfaces group

b. packet internet groper

c. packet interface groper

d. pure internet groper

e. packet international group

19.What is Switchport mode ?

a. The command used in creating VLANs

b. The command used to exit

c. The command used for trunking

d. Answers a and b are correct

e. There is no right answer

20.The domain name of the host / server http://www.bandungbaya.co.id located at?

a. English

b. australia
c. Singapore

d. Indonesia

e. Japan

(15)M. DESFREEZAL Z.B

1.What is the maximum number of ARP entries on a Mikrotik RouterOS device ?

A. Unlimited

B. 2048

C. 8192

D. 10240

2. What is the default TTL (time to live) on a router that an IP packet can experience before it

will be discarded?

A.6O

B.30

C.1

D.64

3. The basic unit of a OSI Layer 2 is the:

A.Header

B.Bit

C.Byte

D.Frame

4. How many usable IP addresses are there in a 24-bit (255.255.255.0) subnet?

A 254

B. 510

C 512

D. 508

5. How many usable IP addresses are there in a 25-bit (255.255.255.128) subnet?

A 126

B. 510

C 512
D. 508

6. How many usable IP addresses are there in a 26-bit (255.255.255.192) subnet?

A 62

B. 510

C 512

D. 508

7. How many usable IP addresses are there in a 27-bit (255.255.255.224) subnet?

A 254

B. 510

C 512

D. 30

8. How many usable IP addresses are there in a 28-bit (255.255.255.240) subnet?

A 14

B. 510

C 512

D. 508

9. How many usable IP addresses are there in a 29-bit (255.255.255.248) subnet?

A6

B. 510

C 512

D. 508

10. How many usable IP addresses are there in a 30-bit (255.255.255.252) subnet?

A2

B. 510

C 512

D. 508

11. How many usable IP addresses are there in a 20-bit (255.255.240.0) subnet?

A 4094

B. 510
C 512

12. Which Subnet is incorrect

A.255.192.0.0

B.255.255.224.0

C.192.0.0.0

D.255.255.192.255

13. Layer 2 in OSI model is also known as MAC Layer

TRUE

FALSE

14. Level 1 (demo); at this level you can use it as a standard routing function with only 1 setting

TRUE

FALSE

15. Level 6 license covers all levels and does not have any limitations

TRUE

FALSE

16.. Level 5 licenses cover levels 1, 3 and 4 plus the ability to manage more hotspot users

TRUE

FALSE

17. To check the user who is currently logged into the proxy through winbox, ssh, and webfig

can be accessed through the menu ......

A. System> User> Active User

B. System> Users> Online Users

C. System> User> Enable User

D. System> Users> Active Users

Answer: D

18. What protocol and port are used by the NTP time configuration application ???

A. UDP 123

B. TCP 321

C. UDP 321
D. TCP 123

Answer: A

19. What status is displayed in the DHCP Client status, when successfully obtaining dynamic IP

addresses ...

A. Success

B. Bound

C. Start

D. Bounding

Answer: B

20. The menu on the winbox that functions to view the proxy configuration tutorial on the

webbrowser is ....

A. Make Supout.rif

B. Manual

C. Mikrotik Wiki

D. System> Manual

Answer: B

(05)CAECARRYO BAGUS D

1.MikroTik RouterOS DHCP client can receive following options

A. Byte limitB. IP GatewayC. Rate limit

B. Uptime limitE. IP Address and Subnet

Penjelasan:DHCP Client dapat diaktifkan di setiap antarmuka Ethernet seperti pada suatu waktu.

DHCP Client akan menerima Ip Address,netmask, gateway default, dan dua alamat dns server.

Uptime Limit akan diterima oleh DHCP Client jika Router yang mesetting DHCP Server juga

menyeting Hotspot.

2.Mark the queue types that are available in RouterOS

A. SFQ – Stochastic Fairness Queuing

B. DRR - Deficit Round Robin

C. FIFO - First In First Out (for Bytes or for Packets)

D. LIFO - Last In First Out


E. PCQ – Per Connection Queuing

F. RED – Random Early Detect (or Drop)

Penjelasan: queue berguna untuk melimit traffic. implementasi Queue di MikroTik RouterOS

berdasarkan Hierarchical Token Bucket (HTB). HTB memungkinkan untuk membuat struktur

antrian hirarkis dan menentukan hubungan antara antrian. Queue memiliki 4 type yaitu

SFQ,PCQ,RED dan FIFO. FIFO terbagi lagi menjadi 3 yaitu BFIFO,PFIFO, dan MQ PFIFO.

3. In general, a computer network consists of the following except

A. Local Area Network

B. Metropolitan Area Network

C. Radio Area Network

C. Wide Area Network

D. Internet

ANSWER: C

4. Servers that can create Unix-based systems (such as Linux) to share resources with

Windows-based systems are

A. Samba

B. Apache

C. Squid

D. Squirel

E. Proxy

ANSWER: A

5. To change file permissions on linux using the command

A. chmod

B. squid

C. chdisk

D. short

E. telnet

ANSWER: A

6. To detect whether the connection between the computer and the network is going well, the
utility used is ...

A. ls

B. clear

C. man

D. tracert

E. ping

7. To see an indication of the IP configuration installed on a computer with a Windows operating

system with the command .....

A. ifconfig

B. ipconfig

C. isconfig

D. cpconfig

E. lsconfig

ANSWER: B

8. IP address consists of two parts namely .....

A. bit and nyble

B. network ID and broadcast ID

C. class A and class D

E. internet and local

E. network ID and host ID

ANSWER: E

9. The 32 bit number used to distinguish Net ID and Host ID is called .....

A. Subnet Mask

B. Submask

C. IP Broadcast

D. Public IP

E. Private IP

ANSWER: A

10. The default partition (root) type Reiserfs is used by the operating system ...
A. Windows XP

B. Linux Redhat

C. Windows ME

D. Linux Suse

E. Linux Ubuntu

ANSWER: D

11. Linux was originally made by a Finnish student named .....

A. Linux Travolds

B. Linux Torvalds

C. Linus Torvalds

D. Linux Travolta

E. Linus Travolta

ANSWER: C

12. The command for DOS to create a new directory is .....

A. dir

B. cd

C. copy

D. rd

E. md

ANSWER: E

13. The basic Linux command to create a new directory is .....

A. mkdir

B. cd

C. mdir

D. rd

E. dir

ANSWER: A

14. The command used to view the list of services in Windows XP is ...

A. services.exe
B. services.asc

C. services.msa

D. services.dll

E. services.msc

ANSWER: E

15. Sign that the shell prompt entered as root is .....

A. #

B. @

C. $

D. *. *

E. ^

ANSWER: A

16. The basic linux command used to delete a directory is .....

A. rmove

B. rmdir

C. mkdir

D. mdel

E. msdir

ANSWER: B

17. Software to manage the layout of files on the hard drive which is the default from Windows

XP is .....

A. disk defragmenter

B. disk formater

C. disk cleaner

D. disk destructor

E. disk partitioner

ANSWER: A

18. Linux can be used by more than one user who enters the system at the same time, termed ...

A. Multiuser
B. Multilevel

C. Multipeople

D. Multimaker

E. Multigetting

ANSWER: A

19. Below are the types of operating systems, except ...

A. Ubuntu

B. Windows XP

C. Mac OS

D. Cytrix

E. Red Hat

ANSWER: D

20. A network where each computer can function as a server means that a computer user on the

network can become an administrator.

A. Peer to peer network

B. Client server network

C. Internet network

D. Server to server network

E. Peer to server network

ANSWER: A

(30)SABITHA AULIA N

1.Which option in the configuration of a wireless card must be disabled to cause the router to

permit ONLY known clients listed in the access list to connect?

A.Default Forward

B.Enable Access List

C.Default Authenticate

D.Security Profile’

Penjelasan:Default Authenticate memungkinkan seluruh client dapat terhubung tanpa diseleksi

oleh Router jika mode ini di non aktifkan maka kita dapat menentukan Kebijakan klient boleh
terkoneksi ke Access Point atau tidak. Jika ingin terkoneksi ke Access Poitn maka pastikan

terlebih dahulu Mac Address Device kamu sudah terdaftar apa belum di Access List jika belum

maka kamu tidak akan bisa konek ke Access Point

2.It is necessary to configure a local DNS server to be able to give out a DNS setting to clients

via DHCP server.

TRUE

Penjelasan: Jawabannya true karena DHCP dapat mengirim DNS server untuk client. DHCP

Server akan mengirim DNS Server ke client dan karena DHCP Client menerima Ip

Address,netmask, gateway default, dan dua alamat dns server maka DNS Server akan langsung

diterima oleh Client

3.To make all DNS requests coming from your network to resolve on your router (regardless of

the clients’ configuration), which action would you specify for the DST-NAT rule?

A. masquerade

B. dst-nat

C. you can’t use DST-NAT to achieve this

D. Redirect

4.Is it posible to have PPTP Client an PPTP Server on one MikroTik router at same time?

TRUE

5.You want to use PCQ and allow 256k maximum download and upload for each client. Choose

correct argument values for the required queue.

A. kind=pcq pcq-limit=1256000 pcq-classifier=dst-address

B. kind=pcq pcq-limit=256000 pcq-classifier=dst-address

C. kind=pcq pcq-limit=5000000 pcq-classifier=src-address

D. kind=pcq pcq-limit=256000 pcq-classifier=src-address

E. kind=pcq pcq-limit=5000000 pcq-classifier=dst-address

Penjelasan: Soal Mikrotik biasanya diperlukan ketelitian saat menjawab karena beberapa soal

dari Mikrotik ada yang menjebak. Nah, termasuk soal ini diperlukan ketelitian. Soal meminta

traffic untuk Download dan Upload sebesar 256K jika ini soal yang memerlukan jawaban

Multiple maka pilih saja keduanya.


6. Subnet mask 11111111.11111111.11111111.11111000 is the same as .....

A. 255.255.0.0

B. 255.255.255.0

C. 255.255.255.224

D. 255.255.255.240

E. 255.255.255.248

ANSWER: E

7. Signal through 2 directions with one cable, the possibility of collision (data collision or data

mixing) is large, is the weakness of the cable type .....

A. Coaxial

B. UTP

C. STP

D. Twisted

E. Unshielded

ANSWER: A

8. The design scheme for building a computer network is known as ...

A. Type

B. Topology

C. Geography

D. Scalability

E. Transmission media

ANSWER: B

9. The division of space in a hard drive is termed .....

A. Division

B. Partition

C. Kernel

D. File system

E. Operating System

ANSWER: B
10. The ability of the operating system to run various commands at the same time is called .....

A. Multi user

B. Pipelining

C. Threading

D. Multitasking

E. Management

ANSWER: D

11. The core of an operating system is called .....

A. Core

B. Linux

C. Kernel

D. Compiler

E. Windows

ANSWER: C

12. The command text for viewing the routing table in Windows is .....

A. route –n

B. route –a

C. route PRINT

D. route –D

E. route -t

ANSWER: C

13. Computers in charge of storing information on web pages that have been accessed before are

.....

A. Router

B. Web server

C. Proxy server

D. Name server

E. Database server

ANSWER: C
14. The front desk in charge of translating the smallest unit of information in the physical layer is

.....

A. LAN Card

B. USB

C. RJ 45

D. Firewire

E. UTP cable

ANSWER: A

15. The smallest unit of information known in data communication is .....

A. Bit

B. Bytes

C. Label

D. Packet

E. Segment

ANSWER: A

16. .According to the OSI reference, the protocol layers are numbered .....

A. 3

B. 4

C. 5

D. 6

E. 7

ANSWER: E

17. A rule whereby the program owner retains his rights but other people are allowed to

distribute and modify, provided that the original source code must be included in the distribution

called .....

A. GPL (General Public License)

B. TTL (Time to Live)

C. OEM (Original Equipment Manufacturer)

D. RTO (Request Time Out)


E. OEP (Overseas Employment promoters)

ANSWER: A

18. Which is not a variant of the GUI-based network operating system that uses a Linux base is

.....

A. Redhat

B. Mandrake

C. Caldera

D. Debian

E. Fortran

ANSWER: E

19. Two software used for boot loader are .....

A. GRUB and FIFO

B. GRUB and LIFO

C. GRUB and LILO

D. LIFO and SWAP

E. LILO and SWAP

ANSWER: C

20. The tool that functions to connect 1 PC with another PC in a local network that is "Manage"

is ...

a. Router

b. Switch

c. Bridge

d. Access point

e. LAN card

jawaban : B

(26)REVALINA NATASYA A.A

1. Mode wireless apakah yang bisa digunakan untuk mengkonfigurasikan WDS?

A. ap-bridge

B. nstreme-dual-slave
C. bridge

D. station-wds

E. Station

Penjelasan: WDS adalah dimana Station dapat menjadi AP dalam satu waktu namun dengan

konsekuensi Bandwidth berkurang 50%. dan untuk membuat WDS kita membutuhkan mode

wireless: Bridge, AP-Bridge, WDS-Slave, dan Station-WDS untuk mengetahui lebih lanjut

silahkan klik disini

2.You need to set up an E1(T1) connection with PPP configured. Which License level is needed?

A.Level 4

B.It cannot be done in RouterOS.

C.Level 5

Penjelasan:E1 adalah setandar yang dipakai di Eropa dan dipakai juga di Indonesia sedangkan

T1 adalah Standard Amerika. Jika kamu mencari

3.Which of the following is NOT a valid MAC Address?

a. 95:B5D:EE:78:8A

b. 13:16:86:53:89:43

c. 80:GF:AA:67:13:5D

d. 88:0C:00:99:5F:EF

e. EA:BA:AA:EE:FF:CB

Penjelasan: MAC address menggunakan Hexa desimal yang dimana maksimalnya adalah huruf

"F" sehingga lebih dari "F" seperti G,H, dll.

4.When sending out an ARP request, an IP host is expecting what kind of address for an answer?

A. VLAN ID

B. IP address

C. MAC Address

D. 802.11g

Penjelasan: ARP berguna untuk pemetaan dari tingkat OSI layer 3 ip address ke OSI Layer 2

Mac Address. ARP digunakan hanya di Ipv4 sedangkan untuk Ipv6 menggunakan protokol NDP

5. In case when router login password is lostm it is necessary to reinstall RouterOS or use
hardware reset function.

A.True

B.False

Answer : True

6. /interface wireless access list is used for

A.Shows a list of Client's MAC address that are already registered at AP

B.Handles a list of Client's MAC Address to permit/deny connection to AP

C.Contains the security profiles settings

D.Authenticate Hotspot users

7. Which is a default baud-rate of currently manufactured RouterBOARDs?

A.115200

B.11520

C.3128

D.8291

8. The first two rules in the forward chain of the filter table are :/ip firewall filter add

chain=forward connection-state=established action=accept/ip firewall filter add chain=forward

connection-state=invalid action=dropconnection-state=related packets are not filtered by the

rules above

A.True

B.False

9. Rate Flapping can be avoided by

A.Reduce supported rates

B.Change ap-bridge to bridge

C.Set basic rates to only one data rate like 24 Mbps

D.Choose larger channels (40 Mhz instead of 20 Mhz)

10. An IP address pool can contain address from more than one subnet

A. True

B.False

11. Impossible to delete admin user on user table mikrotik


A.True

B.False

12. To make all DNS request coming from your network to resolve on your router (regardless of

clients configuration), which action would you specify for the DST-NAT rule?

A.You can't use DST-NAT to achieve this

B.Dst-nat

C.Redirect

D.Masquerade

13. Which default route will be active?/ip routeadd disabled=no distance=10

dst-address=0.0.0.0/0 gateway=1.1.1.1add disabled=no distance=5 dst-address=0.0.0.0/0

gateway=2.2.2.2

A.Route via gateway 1.1.1.1

B.Route via gateway 2.2.2.2

14. For static routing functionality, additionally to the RouterOS system package, you will also

need the following software package :

A.None

B.Dhcp

C.Advance-tools

D.Routing

15. WPA 2 Pre Shared key (PSK) is enabled on AP, all your clients have to use the same PSK.

Only Virtual AP could be used to allow clients to connect with a different PSK.

A.True

B.False

16. Which options should be used when you want to prevent access from one spesific address to

your router web interface?

A.WWW service from IP Services

B.Firewall Filter Chain Input

C.Firewall Filter Chain Forward

D.Group setting for System users


17. a method for simplifying the firewall rules that we made

A. Drop some, others accepted (drop few, accept any)

B. None metode

C. privat/local network

18. srcnat, with permitted actions:

A. Dst-nat

B.Same

C. Netmap

19. Connection status in connection tracking

A. manual-tx-power

B. established

C. WDS-slave

D. station-pseudobridge

20. The WPA 2 Pre Shared (PSK) key is activated on the AP, all your clients must use the same

PSK. Only Virtual AP can be used to allow clients to connect with different CSWs.

A. Correct

B. Incorrect

(22)MUHAMMAD DWI CAHYO

1.A backup file from a MikroTik router is stored in plain text format

False/truth

2. The following, which are not included in the proxy application package are ...

A. System

B. Hotspot

C. Dhcp

D. Mipsbe

3. Which of the following actions are available for '/ip firewall mangle' (select all valid actions)

A. change MSS

B. mark connection

D. Jump
E. Drop

F. mark packet

4. What wireless mode can be used to configure WDS?

A. ap-bridge

B. nstreme-dual-slave

C. bridge

D. station-wds

E. Station

5. RouterOS Mikrotik x86 version is a proxy version that can only be used on devices ..

A. Komputer / PC

B. Routerboard

C. Router Wireless

D. Wireless Outdoor

6. Options that need to be selected when you want to disable a package on the proxy can be done

by clicking on the button ......

A.Disable

B.Downgrade

C.Enable

D.Uninstall

7. Computer network architectural models developed as data communication standards in

A.OSI

B.ISO

C.IEEE

D.IETF

8. The bits are grouped into frames for further processing at the next layer, this process is known

as framming, the process runs on the layer to ...

A.Data Link

B.Physical

C.Network
D.Transport

9. The following are included as the default port of the Winbox application is ....

A.8291

B.8292

C.8080

D.8921

10. Basically a router functions to connect networks that have different IP addresses, routers

operate at the layer to ...

A. Data Link

B. Network

C. Physical

D. Transport

11. The division of a network address, into smaller network groups, it aims to divide and group

hosts into more specific groups, it is known as ...

A. Subnet

B. Host ID

C. Network ID

D. Netmask

12. What service uses TCP protocol and uses port 161

A. SMTP

B. SNMP

C. NTP

D. POP3

13. Service that uses UDP protocol and port 53 as communication media is ...

A. DNS

B. FTP

C. SNMP

D. SMTP

14. The fundamental difference between Telnet and SSH remote access applications is the aspect
...........

A. Security

B. Speed

C. Beauty

D. Mercy

15. To access a proxy via the Webfig path we need an application ......

A. Winbox

B. Putty

C. Web browser

D. Telne

16. The default configuration for a proxy is as follows: ether 1: dhcp clientbridge 1:

ether2-ether3-ether4-ether5, dstip address bridge: ??????? dhcp server: bridge1NAT = yes What

is the ip address interface bridge in the default configuration ??

A. 192.168.88.1/24

B. 192.168.88.0/24

C. 192.168.10.1/24

D. DHCP Client

17. To configure remote access services and ports on a proxy, if you want to change port 80:

www to port 81: www, then the command is ???

A. > ip service set www port = 81

B. > ip service edit www port = 81

C. > ip service set www port = 81 disable = no

D. > ip services set http port = 81

18. The easiest way to configure a routerboard microtic device is to use ...

A. CLI / Text

B. Winbox

C. Webfig

D. Quick Set

19. Installing the proxy router OS on a PC can be done using cdrom, the type of routeros that
must be used is ....

A. Routeros-mipsbe

B. Routeros-smips

C. Routeros-ppc

D. Routeros-x86

20. To access the proxy in text mode using the SSH / Telnet feature, we need client applications

like puTTY and others, the next thing that needs to be known before the remote process is done

....

A. IP Address

B. MAC Address

C. Network Address

D. Subnet

(06)DANDY SATRIA W

1.What configuration was added by the / ip hotspot setup command? (Select all that apply)

a. / pohon antrian

b. / ip hotspot berdinding-kebun

c. / ipdhcp-server

d. / ip hotspot user

2. Can you add drivers manually to RouterOS if your PCI Ethernet card is not recognized, and

you suspect this is a driver problem?

a. Yes

b. No

3. Please select a valid scan-list value in the wireless interface configuration

a. 5540,5560,5620 + 5700

b. 5640 ~ 5680

c. 5560,5620-5700

d. default, 5560.5600,5660-5700

4. For static routing functionality, in addition to the RouterOS system package, you also need the

following software packages:


a. there is no

b. sophisticated tool

c. dhcp

d. route

5. The OS router can set the vlan-id value from - to:

a. 1-2048

b. 1-4096

c. 1-2049

d. 1-4095

6.What protocol can we choose, to conduct bandwidth tests on the proxy winbox ...

A. DHCP

B. ARP

C. ICMP

D. UDP

Answer: D

7.Which package is stored on the Application tools on the routerboard proxy, ...

A. Routing

B. DHCP

C. Firewall

D. System

Answer: D

8.What is the feature in the proxy winbox that functions to monitor in real time the condition of a

host on the network ...

A. Graphing

B. Watchdog

C. Netwatch

D. Ping Test

Answer: C

9.What tools are often used to view statistics and data traffic in the form of src & etc addresses,
bandwidth usage, protocols, ports, etc. on an interface / IP address in realtime ...

A. Firewall

B. Tools

C. Torch

D. Torching

Answer: C

10.Here are some parameters that do not need to be included in the process of using bandwidth

test tools:

A. Test To

B. Direction

C. Lost Packet

D. Protocol

Answer: C

11.What tools are in the winbox that functions to analyze data packets that enter and pass

through the proxy?

A. Traffic Generator

B. Packet Sniffer

C. Packet Filtering

D. Traffic Monitor

Answer: B

12.If we want to configure a netwatch to check the active status of a host on the network, within

a period of every 1 minute, what parameters do we need to set ...

A. Timeout

B. Intervals

C. Since

D. Host

Answer: B

13.To display information about graphics CPU usage, and memory on graphing tools on the

proxy, on the menu do we need to add rules?


A. Resource Rules

B. Interface Rules

C. Interface Graphs

D. Queue Rule

Answer: A

14.To monitor a host using netwatch tools, what parameter information do we need to enter in

the Host section ...

A. Status

B. Host

C. Intervals

D. Timeout

Answer: B

15.A host that is monitored using netwatch tools has two statuses that can identify a host on or

off, what tools do you mean?

A. On / Off

B. Active / Nonactive

C. Download / Upload

D. Up / Down

Answer: D

16.Installing a proxy router OS on a PC can be done with ...

A. Installation via CD ROM

B. Installation via DNS

C. installation through a router

D. installation via netinstall

E. Installation via winbox

ANSWER: A

17.Function to distinguish network ID from host ID:

A. Host ID

B. Network ID
C. Subnet Mask

D. Broadcast Address

E. Network Address

Answer: C

18.To access other computers, SSH is safer than telnet because the data will be sent ...

A. smaller

B. greater

C. made parallel

D. scrambled first

E. Formatted first

ANSWER: D

19.To change file permissions on linux using the command .....

A. chmod

B. squid

C. chdisk

D. short

E. telnet

ANSWER: A

20.IP address consists of two parts, namely .....

A. bit and nyble

B. network ID and broadcast ID

C. class A and class D

E. internet and local

E. network ID and host ID

ANSWER: E

(11)HAIKAL HUMAM

1.The following are proxy features, except ...

A. ip routing

B. interface
C. firewall

D. bandwith manangement

E. prosessing

2. Mikrotik operating system is a linux-based operating system that is used as…

A. network router

B. network komputer

C. ip addres

D. gateway

E. network pc

3. When backing up your router by using the Exporf command, the following happens

A. Win box usernames and passwords are backed up

B. The Export file can be edited with a standard text editor after its creation

C. You are requested to give the export file a name

Penjelasan : ketika kita membuat export file, kita akan diminta untuk memasukan nama file

tersebut, bisa juga lebih spesifik lagi, dan kita bisa mengedit nya di notepad

4. Here's how to access the Mikrotik router, except...

A. telnet

B. SSH

C. web based

D. winbox

E. computer

5. Which features are removed when advanced-tools package is uninstalled

A. neighbors

B. LCD support

C. ip-scan

D. ping

E. netwatch

F. bandwidth-test

6. Bandwidth is the calculation of consumption available on a communication theory calculated


in units of ...

A. kdps

B. mega byte

C. bit/second

D. byte/second

E. mega byte

7. Installing a mikrotik operating system using network media is called ...

A. download

B. share

C. netinstall

D. copy

E. setting

8. The ip web-proxy print command works for.

A. see the results of the web-proxy configuration

B. see the results of the IP address configuration

C. see the results of the DNS configuration

D. see the results of the gateway configuration

E. see the Ethernet configuration results

9. Mikrotik also runs a small ISP, as a trial media for development ...

A. router os software

B. router hardware

C. router indoor

D. router ISP

E. router outdoor

10. Rules / standards that govern or allow communication links and data transfers between two

or more computer points are called ...

A. client

B. gateway

C. protocol
D. ip address

E. hostpot

11. You have an 802.11b / g wireless card. What frequency is available for you?

a. 5800MHz

b. 2412MHz*

c. 5210MHz

d. 2422MHz

e. 2327MHz

12. Action = redirect allows you to make ...

a. Transparent DNS Cache*

b. Forward DNS to the other device's IP address

c. Enable Local Services

d. Transparent HTTP Proxy*

13. Mark all features that are compatible with Nstreme!

a. WDS between devices in station-wds mode and devices in station wds mode

b. Encryption

c. WDS between the device in ap-bridge mode and the device in wds station mode*

d. Bridging devices in station mode with devices in ap-bridge mode

14. Can you add drivers manually to RouterOS if your PCI Ethernet card is not recognized, and

this is a driver problem?

a. Yes

b. No*

15. Is ARP used in the IPv6 protocol?

a. True

b. False*

16. On MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved using

subnet addresses from:

a. / 30*

b. / 29*
c. / 32*

d. / 31

17. How many IP addresses can be used on a 20-bit subnet?

a. 2047

b. 4096

c. 2048

d. 2046

e. 4094*

18. Router OS can get vlan-id values from - to:

a. 1-2049

b. 1-4096

c. 1-4095*

d. 1-2048

19. Collisions are possible on a full-duplex Ethernet network

a. True

b. False*

20. Select the correct default IP-Winbox port

a. TCP 8291*

b. TCP 80

c. UDP 8291

d. TCP 8192

(04)BIKO YOGA H

1. From which of the following locations can you obtain Winbox?

A.Router’s webpage

B.Files menu in your router

C.Via the console cable

D.mikrotik.com

Penjelasan: Winbox dapat ditemukan/diperoleh di Router's Webpage maupun di mikrotik.com.

kamu tidak dapat menemukan Winbox di Menu files di dalam Router maupun lewat kabel
console

2. Which are necessary section in /queue simple to set bandwith limitation ?

A.Max-limit

B.Target-address, max limit

C.Target-address, max-limit, dst-address

D.Target-address, dst-address

3. Action = Redirect is applied in

A.Chain=srcnat

B.Chain=foward

C.Chain=dstnat

4. Which queue-type is suitable for congested environment but not good on UDP?

A.SCQ

B.PCQ

C.RED

D.BFIFO

E.PFIFO

5. Resetting configurations and proxy applications can be done in 3 ways (except)

A.Hard Reset

B.Soft Reset

C.Net Install

D.Flashing

6. When resetting the proxy configuration, the routerboard will reboot, after the reboot process,

what is the ether1 ip address ???

A.Blank

B.Dynamic

C.192.168.88.1

D.192.168.1.1

7. Next, are the configuration options not found in the System configuration menu> Reset

Configuration ...
A.Keep User Configuration

B.No Default Configuration

C.Don't Backup

D.Backup Configuration before Reset

8. Before doing the netinstall process on the proxy, what configuration do we need to do ???

A.Do a Hard Reset

B.Do a Soft Reset

C.Configuring Netbooting

D.Download the application mikrotik_xxxxx.npk

9. On what menu if we want to configure Identity on a proxy router ???

A.System> Identity

B.System> Identity

C.Tool> Identity

D.New Terminal> Identity

10. Which of the following menus / sections does the routerboard identity ???

A.Winbox Status Bar

B.Terminal Console

C.Web page

D.Start Menu Browser

11. The process of accessing the proxy to the router based on user and group settings, the user

and group of proxy can be determined via the menu ...

A.System> User

B.Tool> User

C.Mikrotik> User

D.Terminal> User

12. In the menu, do we see dynamic IP address information (DHCP Client) received by the

DHCP interface ???

A. Status

B. Renew
C. Copy

D. Release

Answer: A

13. PPP Secret is a security method on microtic, PPP Secret can be used in the following

Tunneling, except ....

A. PPPoe

B. SSTP

C. OVPN

D. L2TP

Answer: C

14. menu on wireless to configure security is ...

A. Default Authenticate

B. Security Profile

C. Authenticate

D. SSID

Answer: B

15. Two Host, A and B, are connected to broadcast LAN. Select all the answer showing pairs of

IP address/mask which would allow IP connections to be established between the two hosts

A.A: 10.1.2.192/24 and B: 10.1.2.129/26

B.A: 10.1.2.66/25 and B:10.1.2.109/26

C.A: 10.2.1.0/23 and B: 10.2.0.1/22

16.Which are necessary section in /queue simple to set bandwith limitation ?

A.Target-address, max-limit, dst-address

B.Max-limit

C.Target-address, dst-address

D.Target-address, max limit

17.Installing a proxy router OS on a PC can be done with ...

A. Installation via CD ROM

B. Installation via DNS


C. installation through a router D. installation via netinstall

E. Installation via winbox

18.Indonesia microtic headquarters are in the city

A. semarang

B. jakarta

C. klaten

D. jogjakarta

E. bandung

19.Action = redirect applied at

A. chain = srcnat

B. chain = dstnat

C. chain = forward

D. chain = backward

E. chain = rear

20.To make a lot of rules, you can use the method

A. POR

B. PCQ

C. SFQ

D. IVP

E. SDF

(01)AINUR HAFID A

1.You have to connect to a RouterBOARD without any previous configuration. Select all

possibilities to connect and do some basic configuration

A. Serial Connection

B. MAC-Winbox

C. Attach monitor/keyboard

D. Telnet

Penjelasan: Mikrotik mempunyai Ip default dan kamu bisa memakai Ip Defaultnya untuk login

lewat Telnet, Serial Connection, dan MAC-Winbox


2. When viewing the routes in Winbox, some routes will show "DAC" in the first column. These

flags mean:

A. Dynamic, Active, Console

B. Dynamic, Active, Connected

C. Direct, Available, Connected

D. Dynamic, Available, Created

3.Which of these are possible solutions to bridge two networks over a wireless link:

A. Both devices in AP mode and enable WDS mode

B. One device in AP mode, another one in station-pseudobridge-clone

C. One device in AP mode, another one in station-pseudobridge

D. One device in AP mode, another one in station

4.Which of the following is true for connection tracking

A. Enabling connection tracking reduces CPU usage in RouterOS

B. Connection tracking must be enabled for firewall to be effective

C. Connection tracking must be enable for NAT'ed network

D. Disable connection tracking for mangle to work

5. When backing up your router by using the ‘Export’ command, the following happens:

A. Winbox usernames and passwords are backed up

B. The Export file can be edited with a standard text editor after its creation

C. You are requested to give the export file a name

6. Consider the following network diagram. In R1, you have the following configuration:

/ ip route

add dst-address = 192.168.1.0 / 24 gateway = 192.168.99.2

/ ip firewall nat

add chain = srcnat out-interface = Ether1 action = masquerade

In R2, if you want to prevent all access to the server located on 192.168.1.10 from LAN1

devices, which of the following rules are needed?

a. / ip firewall filter add chain = forward src-address = 192.168.99.1 etc-address = 192.168.1.10

action = drop
b. / ip firewall filter add chain = enter src-address = 192.168.99.1 etc-address = 192.168.1.10

action = drop

c. / ip firewall nat add chain = dstnat src-address = 192.168.99.1 dst-address = 192.168.1.10

action = drop

d. / ip firewall filter add chain = forward src-address = 192.168.0.0 / 24 dst-address =

192.168.1.10 action = drop

7. In the advanced menu of the wireless setup there is a parameter called "Area", it works

directly with:

a. Link List

b. Access list

c. There isn't any

d. Security Profile

8. What menu should be used to allow certain websites to be accessed from behind the hotspot

interface, without client authentication

a. ip hotspot ip-binding

b. hotspot ip profile

c. gardened wall hotspot

d. ip hotspot

9. Which of the following is true for tracking connections

a. Enabling connection tracking reduces CPU usage on RouterOS

b. Connection tracking must be activated for an effective firewall

c. Connection tracking must be activated for NAT'ed

d. Disable connection tracking for mangle to work

10. Which of these solutions is a possible solution for bridging two networks through a wireless

link:

a. Both devices are in AP mode and activate WDS mode

b. One device in AP mode, another in panda-pseudobridge-clone

c. One device in AP mode, another at the pseudobridge station

d. One device in AP mode, another at station


11. When backing up your router using the 'Export' command, the following occurs:

a. Winbox user names and passwords are reserved

b. Export files can be edited with a standard text editor after creation

c. You are asked to name the export file

12. You need to reboot RouterBoard after importing the previously exported rsc file to activate

the new configuration.

True

False

13. It is not possible to disable the "admin" user on the "/ user" menu

True

False

14. If a packet enters the router and starts a new connection that was not previously seen, which

connection state it is

a. no connection status will be applied to the package

b. new

c. unknown

d. invalid

e. established

15. We have two radio cards in a point-to-point connection with the settings:

Nr card 1: mode = ap-bridge ssid = "office"

frequency = 2447 band = 2.4ghz-b / g default-authentication = yes default- forwarding = yes

security-profile = wpa

Card Number 2: mode = ssid station = "office"

frequency = 2412 band = 2.4ghz-b / g default-authentication = yes default-forwarding = yes

security-profile = wpa2

Is Card Nr2. able to connect to Card Nr 1.?

a. Yes, if Nstreme is activated or deactivated in both

b. Yes, if the security profile settings are compatible with each other and Nstreme is activated or

deactivated in both
cases c. No, because of different frequencies

d. No, because of different security profiles

16.There are two mediums of communication in the network namely cable and wireless

True

False

Answer: True

17.2 Types of data transmission cables that Telkom uses to meet customer demand are?

A. Wired

B. Wireless

C. DSL / Copper

D. Optical Fiber

Answer: C, D

18.The dominant IP address used by Telkom embedded in the ONT is?

A. 192.168.10.1

B. 192.168.2.1

C. 192.168.1.1

D. 192.168.100.1

Answer: C, D

19.To facilitate the transfer of IPTV to Telkom Indonesia customers, it provides a tool called

Modem as a tool to translate data into audio video

True

False

Answer: False

20.The initiator of the Mikrotik company is?

A. Peter Alvin

B. John Trully

C. Arnis Riekstins

D. Tjahyo Kumolo

Answer: B, C
(07)DAYANG RAHMAWATI

1. Here are the functions of the Firewall, which are ...

a. Link between 2 different networks

b. Manage and control network traffic

c. Link between 2 networks to the internet using 1 IP

d. Programs that make requests for content from the Internet / Intranet

answer b). Controlling and managing network traffic is one function of a Firewall

2. The tool that functions to connect 2 networks with different segments is ...

a. Router

b. The switch

c. The hub

d. Access Point

answer a). Router is a hardware / device that functions to connect 2 or more networks with

different segments.

3. Which firewall chain would be used to block a client's MSN traffic on a router?

a. output

b. static

c. input

d. forward

4. It is impossible to disable user “admin” at the menu “/user”

True

False

5. Which part needs to be in a simple / queue to set the bandwidth limit?

a. target-address, max-limit

b. target-address, dst-address, max-limit

c. target-address, etc-address

d. maximum limit

Answer: A

6. Routers A and B both run as PPPoE servers on a broadcast domain that is different from your
network. Is it possible to set Router A to use the "/ ppp secret" account from Router B to

authenticate PPPoE customers?

a. yes

b. No

7. The MikroTik RouterOS DHCP client can accept the following options.

a. Border Byte

b. Gateway IP

c. Tariff limit

d. Uptime Limit

e. IP Address and Subnet

8. The results of the proxy backup process are encrypted and can only be restored on a proxy that

uses the Related model and type using …

A. .rsc

B. .bck

C. .Backup

D. .npk

Answer: C

9. Is a protocol on Mikrotik RouterOS that functions to build a Network Tunnel between

MikroTik routers on a TCP / IP connection

A. VPN Tunnel

B. PPTP

C. PPoE

D. EoIP

Answer: D

10. Installing the proxy router OS on the routerboard can be done with ...

A. Installation via CD ROM

B. Installation via DNS

C. installation through a router

D. installation via netinstall


E. Installation via winbox

ANSWER: D

11. The easiest way to configure a routerboard microtic device is to use ....

A. CLI / Text

B. Quick Set

C. Webfig

D. Winbox

Answer: D

12. Network devices that function as network routers, bandwidth management, proxy servers,

dhcp, dns servers and can also function as hotspot servers are ...

A. server

B. gateway

C. routerBoard

D. pc

E. client

ANSWER: C

13. mikrotik also runs a small ISP, as a trial medium for the development ...

A. router os software

B. hardware router

C. indoor router

D. ISP router

E. outdoor router

ANSWER: A

14. If we want to create a user on a proxy that can only be accessed through certain IP addresses,

what options should we configure ???

A. Allow Address

B. Allowed Address

C. Name Address

D. Group Address
Answer: B

15. Users in the proxy are categorized into several groups according to their access rights, the

following are not included in that user group ...

A. Root

B. Full

C. Read

D. Write

Answer: A

16. If we want to configure the service and winbox port can access via the IP menu> Services,

but if we only want to activate a specific service for certain IP addresses, then the option we have

to configure is ...

A. Access Address

B. Allowed Address

C. Available Address

D. Available From

Answer: D

17. The parameter in the Firewall that functions to create / group multiple IP addresses into a

group, so that it makes it easier to process is a feature known as

A. Address List

B. NAT

C. Layer 7 Protocol

D. Filters

Answer: A

18. The backup method, which can partially back up configuration or entire proxy configuration,

can be done via the new terminal, using the command ....

A. Restore

B. Import

C. Export

D. Backup
Answer: C

19. The most important parameter used to configure an EoIP is .....

A. Remote Address & Local Address

B. ARP Table & Tunnel ID

C. MTU & L2 MTU

D. Remote Address & Tunnel ID

Answer: D

20. The technique used to expand a network from an access point without using a cable as is

normally done with a wired network, so that all wireless devices can be connected and

communicate is a technique known as

A. AP-Bridge Dynamic

B. WDS Master & Slave

C. Wireless Distribution System

D. CAPSman

Answer: C

(16)MOCHAMMAD AZIIZ N

1.Which of the following Routes statuses are possible?

A. S = Static

B. D = Drop

C. C = Connected

D. A = Active

2.Can you limit how many clients than are able to connect to access point (routeros)?

A. Yes, but only with access-lists

B. No it's not possible at all

C. Yes

3. Is it possible for a client to get an IP address but no gateway after a successful DHCP request?

FALSE

4. The hotspot feature can be used only on ethernet interfaces. You have to use a separate access

point if you want to use this feature with wireless


No

5. Which of the following protocols / port s are used for SNMP. (Simple Network Management

Protocol)

a. TCP 162

b. UDP 162

c. UDP 161

d. TCP 25

e. TCP 123

f. TCP 161

6. Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,

and you suspect it is a driver issue?

a. Yes

b. No

7. What can be used as ’target-address’ in the simple queue?

a. client’s address

b. client’s MAC address

c. server’s address

d. address list name

8. Which route will be used to reach host 192.168.1.55?

/ip route

add disabled=no distance=1 dst-address=192.168.1.0/24 gateway=1.1.1.1

add disabled=no distance=1 dst-address=192.168.1.0/25 gateway=2.2.2.2

add disabled=no distance=1 dst-address=192.168.0.0/16 gateway=3.3.3.3

a. Route via gateway 1.1.1.1

b. Route via gateway 3.3.3.3

c. Route via gateway 2.2.2.2

9. In which situations can Netinstall NOT be used to install a RouterBOARD?

a. The router does not have an operating system

b. The router is connected only to a wireless network


c. You do not know the password of the router

d. The router is connected only to a secondary Ethernet port

10. To use masquerade, you need to specify

a. action=accept, out-interface, chain=src-nat

b. action=masquerade, out-interface, chain=src-nat

c. action=masquerade, in-interface, chain=src-nat

d. action=masquerade, out-interface, chain=dst-nat

11. In which order are the entries in Access List and Connect List processed?

a. In sequence order

b. In a random order

c. By Signal Strength Range

d. By interface name

12. You can not use OSPF and RIP routing protocols simultaneously on the RouterOS.

a. Yes/ True

b. No/ False

13. While troubleshooting a network from inside the network, you discover that you can ping the

gateway reliably, but you cannot browse the Internet. Skype, however, works flawlessly. What is

the most likely issue?

a. DNS is not available

b. The computer did not get an IP address

c. Network card and/or cable is not working

d. Masquerading rule is not applied

14. You are planning a migration from a wireless link using 802.11a on 5GHz (with no nstreme)

to one using Nv2 on 5GHz. When you change the AP from 802.11a to Nv2, you do not wish a

client to disconnect for more than a few seconds during the upgrade.

Assuming the client is capable of operating with Nv2 (correct hardware, correct encryption key

and ROS version), which setting(s) for 'wireless-protocol' should be enabled on the client so that

the client can auto-detect the protocol used by the AP and still make connection with 802.11a or

Nv2 : (select all that apply)


a. Nv2

b. nv2-nstreme-802.11

c. any

d. unspecified

15. Consider the attached diagram:

In order for Router 1 to see all of the networks the following commands could be used (choose

all answers that could work)

a. /routing add dst-address=0.0.0.0/0 gateway=10.10.0.2

b. /ip route add dst-address=0.0.0.0/0 gateway=10.10.0.2

c. /ip route add dst-address=172.16.0.0/24 gateway=10.10.0.2, /ip route add

dst-address=172.32.0.0/24 gateway=10.10.0.2

d. /ip route add dst-address=172.16.0.0/24 gateway=10.10.0.2, /ip route add

dst-address=172.32.0.0/24 gateway=10.50.0.2

16. Configuring HotSpot is possible on MikroTikRouterOS only with a wireless interface.

a.Yes

b.No

17. In Winbox, Hide Passwords unchecked shows passwords for the following

a. RouterOS user

b. Hotspot User

c. RADIUS shared secret

d. PPP secrets

18. Which options should be used when you want to prevent access from one specific address to

your router web interface?

a. Firewall Filter Chain Forward

b. Firewall Filter Chain Input

c. Group settings for System users

d. WWW service from IP Services

19. Which of the following would prevent unknown clients from connecting to your AP? Choose

the BEST answer.


a. Check the "Do not permit unknown client" box in the wireless configuration

b. Uncheck "Default Authenticate" in the wireless card configuration, and add each known

client's MAC address to your access-list configuration ensuring that you enable "authenticate" in

the entry

c. Add each known client's MAC address to your access-list configuration is the only step

needed

d. Uncheck "Default Authenticate" in the wireless card configuration, and add each known

client's MAC address to your connect-list configuration

e. Configure the radius server under "/radius"

20. What wireless modes can be used in a WDS setup?

a. bridge

b. nstreme-dual-slave

c. station-wds

d. ap-bridge

e. station

(17)MUHAMAD FARREL FAHREZI

1.You want to use PCQ and allow a maximum of 256k downloads and uploads for each client.

Select the correct argument value for the required queue

a. type = pcq pcq-limit = 1256000 pcq-classifier = ff-address

b. type = pcq pcq-limit = 256000 pcq-classifier = ff-address

c. type = pcq pcq-limit = 5000000 pcq-classifier = src-address

d. type = pcq pcq-limit = 256000 pcq-classifier = src-address

e. type = pcq pcq-limit = 5000000 pcq-classifier = ff-address

answer: b, d

2. In which situations can Netinstall NOT be used to install RouterBOARD?

a. The router does not have an operating system

b. The router is only connected to the wireless network

c. You do not know the router password

d. The router is connected only to the secondary Ethernet port


answer: a, c

3. Netinstall can be used for

a. Install a different software version (upgrade or downgrade)

b. Save the configuration, but reset the admin password that is missing

c. Reinstall the software without losing the license

d. Install packages for different hardware architectures

answer: a, c

4. What letters appear next to the route, which is automatically created by RouterOS when the

user adds a valid address to the active interface?

A.A

B. C

C. S

D. I

E. D

Answer: e, a, b

5. Action = redirect allows you to create

a. Transparent DNS Cache

b. Forward DNS to the other device's IP address

c. Enable Local Services

d. Transparent HTTP Proxy

answer: a, d

6. Access List can work if

wireless default authenticate on non

activate (uncheck).

true

false

7. type of rate limit limit on RouterOS

a. 1

b. 2
c. 3

d. 4

8. L2TP uses a port

a. UDP 1701.

b. TCP 1701

c. UDP 1702

d. TCP 1702

9. whether PPTP uses TCP port 1723

yes

no

10. how many wireless interfaces to run dual proxy nstreme

a. 1

b. 2

c. 3

d. 4

11. which one belongs to the encryption model

a. WPA PSK

b. WPA EAP

c. tkip

d. aes ccm

12. which type of authentication is included

a. WPA PSK

b. WPA EAP

c. tkip

13. nstreme is a proxy proprietary wireless protocol

yes

no

14. mac filtering station is on

a. access points
b. connect list

c. access list

15. whether the strength of the signal strength can affect the data rate

yes

no

16. which are not tools in proxy wireless ...

a. a scan

b. sniff

c. snooper

d. signal

17. Next, are the configuration options not found in the System configuration menu> Reset

Configuration ...

A. Keep User Configuration

B. No Default Configuration

C. Don't Backup

D. Backup Configuration before Reset

18. Before doing the netinstall process on the proxy, what configuration do we need to do ???

A. Do a Hard Reset

B. Do a Soft Reset

C. Configuring Netbooting

D. Download the application mikrotik_xxxxx.npk

19. On what menu if we want to configure Identity on a proxy router ???

A. System> Identity

B. System> Identity

C. Tool> Identity

D. New Terminal> Identity

20. The following are options that will not be asked during the IP> Hotspot> Setup process is ....

A. Hotspot interfaces

B. Local Address of Network


C. DNS Servers

D. User Profiles

Answer: D

(20)MUHAMMAD ARYA BIMA

1.When viewing the routes in Winbox, some routes will show "DAC" in the first column. These

flagsmean:

A. Dynamic, Active, Console

B. Dynamic, Active, Connected

C. Direct, Available, Connected

D. Dynamic, Available, Created

Jawaban : BPenjelasan : arti dari DAC adalah Dynamic, Active, Connected

2. During a scan, in order to see all the available wireless frequencies that are supported by the

card , thefollowing option must be selected in the wireless card's "Frequency Mode":

A. superchannel

B. regulatory domain

C. manual txpower

Jawaban : A

Penjelasan : untuk melihat semua frekuensi yang support pada NIC, gunakan mide Superchanel

3. A MikroTik system administrator implemented OSPF Routing protocol in the network.But

realized that he has a static route on the routers. What can be done to make the staticroute work

as a failover whenever the dynamic routing protocol fails.

A. Delete all static routes because there is no way for it to work with OSPF

B. He should use "netwatch" to trigger static routes whenever OSPF fails

C. He should manually disable the static routes and enable them whenever OSPF fails

D. He should increase the administrative distance of the static route(answer)

Penjelasan : untuk membuat failover atau jalur cadangan seperti kasus diatas bisa

denganmemberikan angka distance yang lebih besar pada static routingnya karena router

akanmemprioritaskan angka distance yang lebih kecil

4. RouterOS device has acquired an IP address from an ISP using DHCP client. The samerouter
is used for assigning IP addresses to local users using DHCP server, masquerade

ruleisconfigured properly. Packets that are coming from the ISP have TTL=1. Select correct

A. Router does not have access to the Internet, but clients have

B. Neither router nor clients have access to the Internet

C. All clients and router have access to the Internet

D. Router has access to the Internet, but clients do not(Answer)

Penjelasan : sesuai namanya TTL (TIME TO LIVE ) merupakan header yang menunjukanberapa

lama paket itu bisa bertahan, untuk setiap kali mampir di sebuah roter nilainya akan

berkurang satu, jadi apabila habis ia tidak bisa terkirim ke tujuan selanjutnya, jadi klo TTLnya 1

ia tidak bisa diteruskan lagi

5. The highest priority queue (queue) is

A. 8

B. 16

C. 1

D. 256

6. Consider the wireless access point with mode = ap-bridge. What is the maximum number of

concurrent clients that can be connected to it?

A. 2012

B. 2048

C. 1024

D. 2007

7. The firewall firewall rules are:

A. / ip firewall filter add chain = forward action = jump jump-target = custom

B./ ip firewall filter add chain = custom action = passthrough

C./ ip firewall filter add chain = forward action = log

8. When traffic reaches the end 'chain = custom'. What will happen next?

A. Traffic will be logged chain = forward

B. Traffic will be accepted in the chain = custom

C. Traffic will be dropped in the chain = custom


9. PPP Secrets are used for:

A. PPtP clients

B. Router users

C. L2TP clients

D. PPPoE clients

E. IPSec clients

F. PPP clients

10. For static routing functionality, additional to the RouterOS 'system' package, you also need

the following software packages:

A. advanced-tools

B. no extra package required (No additional package required)

C. dhcp

D. routing

11. Netinstall can be used to:

A. Reinstall software without losing license (Reinstall software without losing license)

B. Install the package for different hardware architectures

C. Install different software versions (upgrade or downgrade) (Install different software

versions (upgrade or downgrade)

D. Keep configuration, but reset a lost admin password

12. What is the correct action for NAT rules on routers that have to intercept SMTP traffic and

send it to certain mail servers?

A. Passthrough

B. tarpit

C. redirect

D. ff-nat

13. Where should you upload the new MikroTik RouterOS package package to upgrade the

router?

A. Any directory in / files

B. FTP the root directory or / files directory of the router


C. System Backup menu

D. System Package menu

14. There is more than one PPPoE server in one broadcast domain:

False

15. What type of encryption can be used to make a connection with a simple access code without

using an 802.1X authentication server?

A. WPA EAP / WPA2 EAP

B. WPA PSK / WPA2 PSK

16.When Mikrotik functions as a DHCP Client, the IP address will automatically be inherited

from the IP Gateway Modem

True

False

Answer: True

17.Out interface that is selected when the NAT setting is the ether port it is headed to?

A. IP Wan

B. IP LAN

C. IP Address

D. IP Routes

Answer: A

18.IP Pool 192.168.100.2 - 192.168.100.25 then the IP that can be connected is?

A. 192.168.100.15

B. 192.168.100.26

C. 192.168.100.30

D. 192.168.100.5

Answer: A, D

19.The menu in Mikrotik to create bandwidth sharing rules is?

A. Routing

B. Queues

C. System
D. Logs

Answer: B

20.How long is level 1 (demo) license valid?

A. Infinite time

B. 1 month

C. 1 year

D. 24 hours

Answer : A

(08)EMA TYA M

1. The function of CSMA CD is

A. Decide on data flow

B. Checking data traffic

C. Connect between switches

D. Give internet access

2. If ARP=reply-only is enabled on one router interface, router can add dynamic ARP entries for

the particular interface.

False

True

3. The command in the CLI Swith to enter the configuration is ...

a. Switch> enable

b. Switch> show

c. Switch> login

d. Switch # configure console

e. # Configure terminal switch

4. What configuration is added by /ip hotspot setup command? (select all that apply)

a. /ip service

b. /ip hotspot user

c. /ip hotspot walled-garden

d. /ip dhcp-server
e. /queue tree

5. Using wireless connect-list it’s possible to prioritize connection to one Access Point over

another Access Point by changing the order of the entries.

a.False

b. True

6. On IP 187.168.11.12 what is called a network id is ...

a. 187

b. 168

c. 187,168

d. 11

e. 12

7. Which is the default port of IP-Winbox?

a. TCP 8291

b. TCP 80

c. UDP 8291

d. TCP 8192

8. MikroTik RouterOS is sending logs to an external syslog server. Which protocol and port is

used by RouterOS for sending logs (by default)?

a. UDP 514

b. UDP 21

c. UDP 113

d. TCP 110

9. When adding a static route, you must always ensure that you add both the gateway and the

interface.

False

True

10. Firewall configuration is the following:

1) /ip firewall filter add chain=input protocol=icmp action=jump jump-target=ICMP

2) /ip firewall filter add chain=input protocol=icmp action=log log-prefix=ICMP-DENY


3) /ip firewall filter add chain=input protocol=icmp action=drop

4) /ip firewall filter add chain=ICMP protocol=icmp action=log log-prefix=JUMP-ICMP-DENY

5) /ip firewall filter add chain=ICMP protocol=icmp action=drop

Client sends "ping" to router. What will the router do?

a. Router will drop the packet at ICMP (jump) chain drop rule (5th rule)

b. Router will log it with prefix: ICMP-DENY

c. Router will drop the packet at the Input drop rule (3rd rule)

d. Router will log it with prefix: JUMP-ICMP-DENY

11. What does this simple queue do (check the image)?

a. Queue limits host 192.168.1.10 upload data rate to one megabit per second.

b. Queue guarantees download data rate of one megabit per second for host 192.168.1.10

c. Queue guarantees upload data rate of one megabit per second for host 192.168.1.10

d. Queue limits host 192.168.1.10 download data rate to one megabit per second.

12. What can you do with Netinstall?

a. Reset password in RouterOS

b. Install Linux

c. Add configuration to RouterOS

d. Reinstall RouterOS

13. Router OS can set vlan-id value from - to :

a. 1-2049

b. 1-4096

c. 1-4095

d. 1-2048

14. Where can you monitor (see addresses and ports) real-time connections which are processed

by the router?

a. Queue Tree

b. Tool Torch

c. Firewall Counters

d. Firewall Connection Tracking


15. To display trunk devices on a switch, use the command ...

a. show trunk brief

b. show trunk interface

c. switchport trunk mode

d. trunk interface

e. show running trunk

16. To limit wireless access for your HotSpot users

a. Create MAC Address restriction on PPP user login

b. Create IP Address restriction in the Wireless Access List

c. Create MAC Address restriction on HotSpot user login

d. Create MAC Address restriction in the Wireless Access List

17. To make the masquerading of the network 192.168.0.0/24, configured on the interface

Ether1, you should add rule

a. /ip firewall nat add chain=dstnat in-interface=ether1 src-address=192.168.0.0/24

action=masquerade

b. /ip firewall nat add chain=srcnatsrc-address=192.168.0.0/24 action=masquerade

c. /ip firewall nat add chain=dstnat out-interface=ether1 src-address=192.168.0.0/24

action=masquerade

d. /ip firewall nat add chain=srcnat out-interface=ether1 src-address=192.168.0.0/24

action=masquerade

18. On the advanced menu of the wireless setup there is a parameter called "Area", it works

directly with:

a. None of these

b. Connect List

c. Access List

d. Security Profile

19. To display VLANs on a switch, use the command ...

a. Show Vlan Brief

b. Switchport access mode


c. VLAN NAME

d. Show IP

e. Show VLAN NAME

20. HotSpot is required on the interfaces ether2, ether3, wlan1 (in ap-bridge mode).

These interfaces are bridged in the bridge1 interface.

Which interface should the HotSpot server be configured on?

a. On ether2 interface

b. On ether3 interface

c. On wlan1 interface

d. On bridge1 interface

(34)SHAFA NATHANIELA SALWA

1. Action=redirect applies to

A. Route rules

B. DST-NAT rules

C. Firewall Filter rules

D. SRC-NAT rules

Correct Answer: B

2. What can be used as a 'target-address' in a simple queue?

a. client address

b. client MAC address

c. server address

d. name list address

3. Hotspot is required on the interfaces ether2, ehter3, wlan1 (in ap-bridge mode).

These interfaces are bridged in the bridge1 interface.

Which interface should the Hotspot server be configured on?

A. ether2

B. ether3

C. bridge1

D. wlan1
Correct Answer: C

4. Mark all the configuration where RouterOS is utilizing the DNS feature

A. Layer-7 packet filter configuration

B. Hotspot configuration

C. Web-proxy configuration

D. PPP Configuration

Correct Answer: B

5. Which facility should be used, to ensure that clients with radio signal strength poorer than -90

dBm can't connect to interface wlan1 on Mikrotik Access Point?

A. Access List

B. Connecttion List

C. Registered List

D. Hotspot User Profile

Correct Answer: A

6. /ip firewall nat

add chain=dstnat in-interface=ether1 protocol=tcp dst-port=3389 action=dst-nat

to-address=192.168.1.2 toports=81

The command shown above:

A. Forwards any TCP traffic incoming through ether1 port 81 to the port 3389 of the internal

host 192.168.1.2

B. Forwards all TCP traffic from 192.168.1.2 to port 81 of the interface ether1

C. Forwards any TCP traffic incoming through ether1 port 3389 to the port 81 of the internal

host 192.168.1.2

D. Adds IP address 192.168.1.2 to the interface ether1

Correct Answer: C

7. If ARP = reply-only is activated on one router interface, the router can add dynamic ARP

entries for a particular interface.

False

True
8. Where is the default port IP-Winbox?

a. TCP 8291

b. TCP 80

c. UDP 8291

d. TCP 8192

9. Choose a valid MAC address

a. G2: 60: CF: 21: 99: H0

b. 00:00: 5E: 80: EE: B0

c. AEC8: 21F1: AA44: 54FF: 1111: DDAE: 0212: 1201

d. 192.168.0.0/16

10. Which computer can communicate directly (without the router involved)

a. 192.168.17.15/29 and 192.168.17.20/28

b. 192.168.0.5/26 and 192.168.0.100

c. 10.5.5.1/24 and 10.5.5.100/25

d. 10.10.0.17/22 and 10.10.1.30/2

11. MikroTik RouterOS sends logs to an external syslog server. Which protocols and ports does

RouterOS use to send logs (by default)?

a. UDP 514

b. UDP 21

c. UDP 113

d. TCP 110

12. What configuration is added by the / ip hotspot setup command? (Select all that apply)

a. / ip service

b. / ip hotspot user

c. / ip gardened hotspot

d. / ip dhcp-server

e. / queue tree

13. Using a wireless connection list, it is possible to prioritize connections to one Access Point in

another Access Point by changing the order of entries.


a. Incorrect

b. Correct

14. If ARP = reply-only is configured on an interface, what interface will be done

a. Add a new MAC address in the / ip arp list

b. Accept all MAC addresses listed in / arp ip as static entries

c. Add a new IP address on the arp / ip list

d. Accept all IP addresses listed in / arp ip as static entries

e. Accept all IP / MAC combinations listed in / arp ip as static entries

15. Routers A and B both run as PPPoE servers on a broadcast domain that is different from your

network. It is possible to set Router A to use the "/ ppp secret" account from Router B to

authenticate PPPoE customers.

a. Incorrect

b. Correct

16. In which order are entries in the Access List and Welcome List processed?

A. In descending order

b. In random order

c. With Signal Strength Range

d. With interface names

17. Protocol what is used ping?

A.TCP TCP

B. ICMP

C. UDP

D. ARP

18. When solving network problems from within the network, you find that you can ping gates

reliably, but you cannot surf the Internet. Skype, however, works perfectly. What is the most

likely problem?

a. DNS not available

b. The computer does not get an IP address

c. Network card and / or cable not functioning


d. Masquerading rules do not apply

19. What is indicated by connection-state = established matcher?

a. The packet starts a new TCP connection

b. The packet does not match the known connection

c. Packages belonging to an existing connection, for example a reply package or a package

that includes a connection that has been answered

d. The package deals with, but is not part of an existing connection

20. For static routing functionality, in addition to the RouterOS system package, you also need

the following software package:

a. route

b. no

c. dhcp

d. advanced tools

(29)RIZKY YULIAN PRAYOGO

1. RouterOS Mikrotik x86 version is a proxy version that can only be used on devices ...

A.Computer / PC

B.Routerboard

C.Wireless Router

D.Outdoor Wireless

2. Mark all correct statements about /export file=(name of an rsc file).

a. Exports logs from /log print

b. Exports full configuration of the router (without RouterOS user password) +

c. Exports only part of the configuration (for example /ip firewall) +

d. Exports scripts from /system script

e. Exports files could not edited

3. It is possible to add user-defined chains in ip firewall mangle

Yes

4. Action=redirect allows you to make

a. Transparent DNS Cache


b. Forward DNS to another device IP address

c. Enable Local Service

d. Transparent HTTP Proxy

5. Which are necessary sections in /queue simple to set bandwidth limitation?

a. target-address, max-limit ++

b. target-address, dst-address, max-limit -

c. target-address, dst-address

d. max-limit

6. Computer network architectural models developed as data communication standards in

computer networks

A.OSI

B.ISO

C.IEEE

D.IETF

7. Two hosts, A and B, are connected to a broadcast LAN. Select all the answers showing pairs

of IP address/mask which would allow IP connections to be established between the two hosts.

A. A: 10.1.2.66/25 and B: 10.1.2.109/26

B. A: 10.2.2.1/23 and B: 10.2.0.1/22 -

C. A: 10.1.2.192/24 and B: 10.1.2.129/26 -

D. A: 10.2.1.0/23 and B: 10.2.0.1/22

8. Why is it useful to set a Radio Name on the radio interface?

a. To identify a station in a list of connected clients

b. To identify a station in the Access List

c. To identify a station in Neighbor discover

9. Which default route will be active? ip route

add disabled=no distance=10 dst-address=0.0. 0.0/0 gateway=1.1.1.1

add disabled=no distance=5 dst-address=0.0. 0.0/0 gateway=2.2.2.2

a. Route via gateway 1.1.1.1

b. Route via gateway 2.2.2.2


10. What feature is the proxy winbox that functions to ping flood the router?

A. Telnet

B. Test Server

C. Ping

D. Flood Ping

Answer: D

11. What is the number of packet count limitations on the Mikrotik winbox Flood Ping tool is ...

A. 1500

B. infinity

C. 1000

D. 2000

Answer: A

Jawaban : B

12. In which situations Netinstall can not be used to install RouterOS on a RouterBOARD?

A. The router is connected only to a secondary Ethernet port

B. The router does not have an operating system

C. The router is connected only to a wireless network

D. The password of the router is not known

Jawab : C

Penjelesan : untuk menggunakan Netinstall router harus terhubung melalui ethernet

13. DHCP server is configured on a router’s ether1 interface. IP address 192.168.0.100/24 is

assigned to the interface. Possible IP pools, that can be used by this DHCP server, are:

A. 192.168.0.1-192.168.0.255

B. 192.169.0.1-192.169.0.254

C. 192.168.0.1-192.168.0.99 , 192.168.0.101-192.168.0.254

D. 192.168.0.1-192.168.0.14

Jawaban : C

Penjelasan : ip 192.168.0.100 sudah terpakai oleh router pada interface ether1

You have a DHCP server on your MikroTik router.


12. The IP addresses 10.1.2.2-10.2.2.20 are distributed in the DHCP network. Additionally, 3

static IP address are defined for your servers: 10.1.2.31-10.1.2.33. After a while 20 more IP

addresses need to be distributed in the network. It is possible to distribute the extra IP address

without adding another DHCP Server:

Jawaban : false

Penjelasan : kita harus menambahkan DHCP Server untuk menambahkan ip pool lagi

13. During a scan, in order to see all the available wireless frequencies that are supported by the

card, the following option must be selected in the wireless card's "Frequency Mode":

A. superchannel

B. regulatory domain

C. manual txpower

Jawaban : A

Penjelasan : untuk melihat semua frekuensi yang support pada NIC, gunakan mode Superchannel

14. It is required to make a web server on a private LAN visible on the Public Internet. Only the

web server port should be visible to the public. Which of the following configuration steps must

be met.

A. Public IP address of the webserver must be installed on the NAT Router

B. A route between the NAT Router and the webserver must exist

C. Connection Tracking must be enabled on NAT router

D. in ip firewall NAT there should be a dst-nat between the public ip of the router and the private

ip of

the webserver

LAN address of the webserver should be routable on the internet

Jawaban : D dan B

Penjelasan : IP public web server harus di terjemahkan ke IP Private untuk di konfig

15. How long is level 1 (free) license valid?

A. 1 month

B. 24 hours

C. 1 year
D. Infinite time

Jawaban : B

Penjelasan : lisensi level 1 hanya bisa dipakai selama 1 hari atau 24 jam

16. What is the correct action for a NAT rule on a router that should intercept SMTP traffic and

send it over to a specified mail server?

A. tarpit

B. dst-nat

C. passthrough

D. redirect

Jawaban : D

Penjelasan : router akan mengarahkan packet kea rah yang telah ditentukan oleh admininstrator

17. It is possible to create an encrypted PPPoE tunnel in RouterOS:

Jawaban :true

Penjelasan : karena ketika kita ingin membuat pppoe untuk kclient, client tersebut membutuhkan

autentikasi yang dibuat di Secret

18. A DHCP server is configured on a LAN interface which is a port on a bridge. The DHCP

server does not start. What could be the reason(s)?

A. The DHCP server can not run on an interface which is also a bridge port

B. There might not be an IP address assigned to the LAN Interface

C. The IP address pool could be incorrectly defined

D. There may be multiple IP addresses set on the LAN interface

Jawaban : A

Penjelasan : jika interface tersebut sudah di bridge, dhcp server pada interface tersebut tidak akan

berjalan, kecuali kita memasang dhcp sernya pada interface Bridge.

19. You want to transfer existing '/ip firewall filter' configuration from one router to a new

system. Choose the best possible way to do:

A. Export global configuration and remove everything apart from '/ip firewall filter'

B. Export only '/ip firewall filter'

C. Create backup, edit backup file and restore on target router


D. Create backup only of '/ip firewall filter' rules

Jawaban : B

Penjelasan : hanya perlu meng-export konfigurasi /ip firewall filter

20. There are two routes in the routing table:

dst-addr=10.1.1.0/24 gateway=5.5.5.5

dst-addr=10.1.1.4/30 gateway=5.6.6.6

Which gateway will be used to get to the IP address 10.1.1.6?

A. both - half of the traffic will be routed through one gateway, half through the other

B. 5.5.5.5

C. the required route is not in the routing table

D. 5.6.6.6

Jawaban ; D

Penjelasan : router mencari prefix yang lebih spesifik

(33)SAYID MUHAMMAD ALDI D

1. Flapping rates can be avoided by

A. Select a larger channel (40 Mhz, not 20 Mhz)

B. Reduce the level of support

C. Change ap bridge to be a bridge

D. Set a base rate on only one data rate such as 24 Mbps

2. Collisions are possible in full-duplex Ethernet networks.

FALSE

Penjelasan: Tidak semua Kesalahan dala networking itu berasal dari Ethernet. Semua kesalahan

bisa terjadi mulai dari salah konfigurasi, kesalahan Router maupun kesalahan pada kabel

sehingga jawaban yang tepat adalah False karena tidak semua kesalahan terjadi pada kabel

3. What letters appear next to a route, which is automatically created by RouterOS when user

adds a valid address to an active interface?

A. I

B. D

C. A
D. S

E. C

JAWAB : B

4. What can be used as ’target-address’ in the simple queue?

a. client’s address

b. client’s MAC address

c. server’s address

d. address list name

Jawaban : A

IP Laptop Sendiri

5. Simple Queue number 0 defines 2M for upload and download for target IP 10.10.0.33. Simple

Queue number 1 defines 4M for upload and download for target IP 10.10.0.33. Client

10.10.0.33 is be able to obtain

A. 6M upload/download

B. 0M upload/download

C. 4M upload/download

D. 2M upload/download

Jawaban : D

Penjelasan : berapapun jumlah simple queue yang dibuat, yang digunakan adalah yang paling

pertama.

6. tools package is uninstalled?

A. neighbors

B. LCD support

C. ip-scan

D. ping

E. netwatch

F. bandwidth-test

Jawaban : C, D, E, F

7. You have a DHCP server on your MikroTik router. The IP addresses 10.1.2.2-10.2.2.20 are
distributed

in the DHCP network. Additionally, 3 static IP address are defined for your servers:

10.1.2.31-10.1.2.33. After a while 20 more IP addresses need to be distributed in the network. It

is possible to distribute the

extra IP address without adding another DHCP Server:

Jawaban : false

Penjelasan : kita harus menambahkan DHCP Server untuk menambahkan ip pool lagi

8. Select which of the following are ‘Public IP addresses’:

a. 192.168.0.1

b. 172.168.254.2

c. 172.28.73.21

d. 10.110.50.37

e. 11.63.72.21

Jawaban : B & E

A, C, D adalah IP Private

9. What is the correct action to be specified in the NAT rule to hide a private network when

communicating to the outside world?

A. masquerade

B. allow

C. passthrough

D. tarpit

Jawaban : A

Penjelasan : action masquerade digunakan untuk menerjemahkan IP Private ke IP Public

10. Mark possible connections in the connection tracking table

A. Associated

B. Not valid

C.Close

D. Established

E.Syn
F.New

11. Not possible to delete the admin user in the proxy table user

A. Correct

B. Incorrect

12. Which choice should you use when you want to prevent access from one specific address to

your router's web interface?

A. Group settings for System users

B. Enter the Firewall Filter Chain

C.First Firewall Filter Chains

D. WWW Services from IP Services

13. Which is the standard baud rate for RouterBOARDs currently produced?

A.115200

B.8291

C.11520

D.3128

14. Which type of queue is suitable for crowded environments but not good for UDP?

A.PCQ

B.BFIFO

C.PFIFO

D. RED

E.SCQ

15. What parameters must be considered in the scanner menu when we want to connect a proxy

(station) to an access point (internet)

A. SSID

B. Address

C. Signal

D. Channel

Answer: C

16.You need to set up an E1(T1) connection with PPP configured. Which License Level is
needed?

A. Level 4

B. It cannot be done in RouterOS

C. Level 5

Answer : B

17.Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,

and it's a driver issue?

Yes

No

Answer : No

18.To make all DNS request coming from your network to resolve on your router (regardless of

clients configuration), which action would you specify for the DST-NAT rule?

A. Dst-nat

B. Redirect

C. Masquerade

D. You can't use DST-NAT to achieve this

Answer : B

19.Rate Flapping can be avoided by:

A. Choose larger channels (40 Mhz instead of 20 Mhz)

B. Reduce supported rates

C. Set basic rates to only one data rate like 24 Mbps

D. Change ap-bridge to bridge

Answer : B

20.Which software version can be installed onto the following RouterBoard types?

A. Routeros-x86-x.xx.npk on a RB1100

B. Routeros-powerpc-x.xx.npk on a RB333

C. Routeros-mipsle-x.xx.npk on a RB133

D. Routeros-mipsbe-x.xx.npk on a RB433

E. Routeros-mipsbe-x.xx.npk on a RB133
Answer : C, D

(27)RIDWAN AJI N

1. If you need to ensure that one computer on your HotSpot network can access the Internet

without HotSpot authentication, which menu allows you to do this?

a. User

b. IP binding

c. Walled-garden

d. IP walled garden

2. How many different priorities can be chosen for queuing on MikroTik RouterOS?

a. 8

b. 16

c. 0

d. 1

3. Check the permitted input formats for the wireless scan list.

a. 5500,5700

b. 5500-5700

c. 5500/5700

d. 5500 - 5700

e. 5500 5700

4. To connect your MikroTik router to a wireless access point, you must:

a. Use the same Radio Name

b. Use the same SSID as the accesspoint

c. Use the same band (5 GHz, 2.4 GHz, ...)

5. The highest priority queue is

a. 256

b. 1

c. 16

d. 8

6. What is needed for the PPPoE client configuration?


a. Static IP address on PPPoE client interface

b. ip firewall nat masquerade

c. Interface (where the PPPoE client will work)

7.What is the meaning of Private IP?

A. IP used on the local network

B. IP used on the internet

C. First IP of the network

8. What is the meaning of Public IP?

A IP used on the local network

B. IP used on the internet

C. First IP of the network

9. Which is IP A Class?

A. 10.20.1.2

B. 10.256.27.1

C. 192.168.27.1

D. 10.27.2.1

10. Which is IP B Class?

A. 192.168.1.1

B. 10.10.1.1

C. 172.27.1.1

D. 128.28.1.2

11. Which is IP C Class ?

A. 192.168.27.1

B. 127.27.1.3

C. 192.27.1.1

D. 10.10.1.1

12. Which is true statement about Network ID?

A. First usable IP of the network

B. Last IP of the network


C. First IP of the network

13. Which is true statement about Broadcast ID?

A. First usable IP of the network

B. Last IP of the network

C. First IP of the network

14. Range of A Class IP Address is

A. 10.0.0.0 – 10.10.255.255

B. 10.10.0.0 – 10.255.255.255

C. 10.0.0.0 – 10.255.255.255

15. Port of ICMP is?

A. 22

B. 23

C. 1

D. 80

16. Range of B Class IP Address is

A. 192.168.0.0 – 192.168.255.255

B. 128.0.0.0 – 192.168.255.255

C. 17.16.0.0 – 172.31.255.255

D. 10.0.0.0 – 10.255.255.255

17. Range of C Class IP Adress is

A. 10.0.0.0 – 10.255.255.255

B. 172.31.0.0 – 172.32.255.255

C. 192.168.1.0 – 192.168.255.255

D. 192.168.0.0 – 192.168.255.255

18. How many usable IP in 27-bit (255.255.255.254)

A. 32

B. 30

C. 64

D. 62
19. Default IP on winbox

A. 192.168.1.1

B. 0.0.0.0

C. 10.0.0.0

D. 192.168.88.1

20 .Action=redirect allows you to make

A. Transparent DNS Cache

B. Forward DNS to another device IP address

C. Enable Local Service

D. Transparent HTTP Proxy

(37)VALENTINO MALAKIANNO P.N

1. The 'connectlist' of wireless interfaces is used

A. for preventing communications between the clients

B. for configuring SSID on the interface

C. for specifying APs to connect to

D. for specifying APs not to connect to

2. Which configuration menu should you use to change router's Winbox default port?

A. /ip firewall serviceports

B. /ip service

C. /system resource

D. /ip firewall filter

3. Which firewall chain should be used for filters that protect your router interface?

A. forward

B. prerouting

C. postrouting

D. input

4. Router has wireless and ethernet client interfaces, all client interfaces are bridged. To create a

DHCP service for all clients, DHCP server must be

configured on:
A. Ethernet and wireless interfaces

B. DHCP service is not possible in this setup

C. Every bridge port

D. Only on the bridge interface

5. What is the term for the hardware code address found in the interface?

a. IP address

b. Interface Address

c. MAC Address

d. FQDN Address

6. What is the meaning of the status letter "R" on a PPPoE client interface in RouterOS

Interfaces menu?

A. Reconnecting

B. Running

C. Radius

D. Remote

7. What protocol is used for the Ping and Trace route?

a. DHCP

b. I P

c. TCP

d. ICMP - ping

e. UDP - route trace

8. What types of users are listed in the Secret PPP menu window?

a. pptp users

b. l2tp users

c. Winbox users

d. wireless users

e. pppoe users

f. hotspot users

9. Which of the following IP addresses can be done in general?


a. 127.34.155.3

b. 192.168.1.4

c. 172.16.13.23

d. 11.3.10.4

10. You have a router with configuration

- Public IP: 202.168.125.45/24

- Default gateway: 202.168.125.1

- DNS server: 248.115.148.136, 248.115.148.137

- Local IP: 192.168.2.1/24

Mark the correct configuration on the client PC to access the Internet

a. IP: 192.168.0.1/24 gateway: 192.168.2.1

b. IP: 192.168.2.253/24 gateway: 202.168.0.1

c. IP: 192.168.1.223/24 gateway: 248.115.148.136

d. IP: 192.168.2.115/24 gateway: 192.168.2.1

e. IP: 192.168.2.2/24 gateway: 202.168.125.45

11. The MAC layer with the OSI model is also known as

a. Layer 3

b. Layer 7

c. Layer 2

d. Layer 6

e. Layer 1

12. How many layers does the Open System Interconnection model have?

a. 12

b. 6

c. 9

d. 5

e. 7

13. How many IP addresses can we find in the header of an IP packet?

a. 3
b. 4

c. 1

d. 21

14. The basic units of physical network (OSI Layer 1) are:

a. Byte

b. Frame

c. Bit

d. Header

15.If the router can ping a public ip address (example: 8.8.8.8), but cannot ping a domain name

(DNS), what options should we configure ...

A. DHCP Server

B. DNS Servers

C. Gateway

D. Servers

Answer: B

16.The term is often used to specify the minimum guaranteed speed that can be accepted by

clients when the connection is busy / traffic is high ...

A. Commited random information

B. Commited information Rate

C. Commited information Range

D. CIR & MIR

Answer: B

17.The Walled Garden feature is a feature to allow users to access an address without

authentication, the action on a walled garden is ....

A. Allow & deny

B. Drop & reject

C. Accept & drop

D. Bypass & block

Answer: A
18.The basic difference between chains in NAT is srcnat and dstnat, features that function to

change connection access from public to local networks

A. Redirect

B. Srcnat

C. Dstnat

D. Jump

Answer: C

19.A NAT action that works if the LAN has a different prefix than the public IP prefix. For

example, IP LAN has a prefix / 24 and will be NAT to Public IP with a prefix / 27. At the

beginning of the connection, the LAN IP will be randomly changed to Public IP.

A. Tarpit

B. Same

C. Netmap

D. Passtrough

Answer: B

20.by default what is included in the Mikrotik Filter Firewall feature ...

A. Srcnat, etc.

B. Input, output, forward

C. Drop, reject

D. Prerouting, postrouting

Answer: B

(19)MUHAMMAD ANJAS A

1. To check the results of installing the RJ 45 connector on the UTP cable we use ...?

A.Creamed pliers

B.Multitester

C.LAN Tester

D.POE

E.Connector

2. To strengthen the signal on the local network cable,we need device ...?
A.Bridge

B.The gateway

C.Repeater

D.Amplifier

E.Router

3. What is the stands for DHCP ?

A.Dynamic Host Config Post

B.Diagnose Host Command Protocol

C.Dynamic Hold Configuration Post

D.Dynamic Host Configuration Protocol

E.Diagnose Host Configuration Protocol

4. Communication that is done without using cable is called ...?

A.Direct

B.Cabless

C.Wireline

D.Wireless

E.Dekless

5. In network technology known as the OSI model, what does OSI stands for ...?

A.Organization Standard Interconnection

B.Open International Standards

C.International Standards Organization

D.Open System Interconnection

E.Over International System

6. Service on the server that allows clients to send electronic mail locally or via the internet is

called ...?

A.Web Mail

B.Mail Server

C.FTP Server

D.Web Server
E.Mail Client

7. The following program that functions of proxy server is ...?

A.Samba

B.Squid

C.Squirrel

D.Python

E.Apache

8. The following program that functions of web server is ...?

A.Apache

B.Squid

C.Nginx

D.Python

E.Samba

9. Below that are WAN devices, except ...

A. Hub

B. Modem

C. Repeater

D. Router

E. Bridge

10. Services that can be activated on the server are as follows, except ...?

A.NTFS Server

B.DHCP Server

C.FTP Server

D.DNS server

E.WEB Server

11. OSI Reference Model consists of 7 layers, the 4th layer of the OSI reference is ....?

A.Presentation

B.Session

C.Network
D.Transport

E.Application

12. OSI Reference Model consists of 7 layers, the 1st layer of the OSI reference is ....?

A.Physical

B.Session

C.Internet

D.Network

E.Application

13. TCP Reference Model consists of 4 layers, the 3rd layer of the TCP reference is ....?

A.Physical

B.Session

C.Internet

D.Transport

E.Application

14. Name / identity of the Access Point is called ...?

A.WEP

B.WAP

C.WPA

D.SSID

E.MAC Address

15. Port that we can used to open services of NetBIOS-ns is ?

A.25 - TCP

B.23 - TCP

C.137 - TCP

D.123 - UDP

E.3128 – TCP

16. In the security of the data network is damaged before reaching the destination called ...?

A.Interruption

B.Interception
C.Modification

D.Fabrication

E.DoS

17. In general, a computer networks consists of the following below,except ...

A.Local Area Network

B.Metropolitan Area Network

C.Radio Area Network

D.Wide Area Network

E.Personal Area Network

18. The tool used to determine the frequency that has been used by other WaveLAN networks is

called ...

A. Spectrum Analyzer

B. AVO Meter

C. Multi Meters

D. Syncronize Analyzer

E. Metal Analyzer

19. In Mikrotik has 2 backup mode,it called ?

A.Full Backup & Half Backup

B.Dedicated Backup & Standard Backup

C.Multi Backup & Single Backup

D.Full Backup & Seperated Backup

E.Half Backup & Multi Backup

20. Mikrotik RouterOS is based GUI operating system,if we want to execute it in CLI which is

the menu that we can open ?

A.Queues

B.Switch

C.PPP

D.New Terminal

E.Interfaces

Anda mungkin juga menyukai