1. For static routing functionality, additionally to the RouterOS system package, you will also need the
following software package:
A .None
B.DHCP
C.Routing
D.Advance-Tools
Penjelasan: Static route memang tidak membutuhkan paket. Static Route memang sudah seperti
Routing yang diberikan oleh seluruh alat.
A.IP
B.DHCP
C.ICMP
D.UDP
E.TCP
FALSE
Penjelasan: Tidak semua Kesalahan dala networking itu berasal dari Ethernet. Semua kesalahan
bisa terjadi mulai dari salah konfigurasi, kesalahan Router maupun kesalahan pada kabel
sehingga jawaban yang tepat adalah False karena tidak semua kesalahan terjadi pada kabel
FALSE
Penjelasan: Jika kamu pernah membuka Winbox dan membuka menu "User" maka kamu dapat
mengetahui jawaban ini. User Admin merupakan Default User yang diberikan oleh Mikrotik
agar dapat mengakses Winbox. User ini dapat kita Delete maupun kita Disable. so it Possible to
A.255.192.0.0
B.255.255.224.0
C.192.0.0.0
D.255.255.192.255
Penjelasan: Subnet mask adalah istilah teknologi in ormasi dalam Bahasa Inggris yang
mengacu kepada angka biner 32 bit yang digunakan untuk membedakan network ID dengan
Host ID, menunjukan letak suatu host, apakah berada di jaringan lokal atau luar. untuk
6. You need to reboot a RouterBoard after importing a previously exported rsc fle to activate the new
confguration.
TRUE
Penjelasan:Reboot bisa dipakai saat kamu mengimport export fle atau backup fle karena jika
kamu ga mereboot RouterBoard kamu maka backup fle kamu atau export flenya tidak akan ke
7. You have a DHCP server on your MikroTik router. The IP addresses 10.1.2.2-10.2.2.20 are distributed
in the DHCP network. Additionally, 3 static IP address are defined for your servers: 10.1.2.31-
10.1.2.33. After a while 20 more IP addresses need to be distributed in the network. It is possible to
distribute the extra IP address without adding another DHCP Server:
TRUE
Penjelasan : kita harus menambahkan ip pool lagi tanpa menambahkan DHCP Server
8. It is required to make a web server on a private LAN visible on the Public Internet. Only the web
server port should be visible to the public. Which of the following configuration steps must be met.
(select all that apply)
B. A route between the NAT Router and the webserver must exist
D. in ip firewall NAT there should be a dst-nat between the public ip of the router and the
9. There can be more than one PPPoE server in a single broadcast domain:
TRUE
10. You want to use PCQ and allow 256k maximum download and upload for each client. Choose correct
argument values for the required queue.
11. Which of the following actions is available for '/ ip firewall mangle' (select all valid actions)
A.Change MSS
C. Accept
D. Jumping
E. Descent
12. You need to set the E1 (T1) connection with the configured PPP. Which License Level are needed?
A. Level 4
C. Level 5
13. You have a router with Public-IP configuration: 202.168.125.45/24- Default Gateway:
202.1687.125.1-DNS Server: 248.115.148.136, 248.115.148.137-Local IP: 192.168.2.1/24 Mark
configuration connections on the client PC to access to the internet
14. The IP address pool can contain addresses from more than one subnet
A. Correct
B. Incorrect
15. Which features are removed when a sophisticated tool package is uninstalled?
A. Neighbors
B.IP scan
C. Netwatch
D. LCD support
E. Ping
F. Bandwith-test
16. Which parameter on the DHCP Client is used to view the validity of the ip address …
A. Lease Time
B. Expire At
C. Leases Time
D. Expires After
Answer: D
17. What parameters are in the NAT configuration, which functions to add Address-list information
dynamically ...
Answer: B
18. The menu options on the firewall that function to do connection tracking on the proxy are ...
A. Connection Track
B. Connection Tracking
C. Traceroute
D. Connections
Answer: D
19. Bridge is a feature that functions to combine different interfaces into one logical interface. The
following are the advantages of bridges are ...
B. Problems in one segment will create problems in all segments of the same bridge
C. Difficult to regulate broadcast traffic (eg due to viruses, etc.)
Answer: A
20. The following are the wireless modes that are not included on the wlan1 interface ...
A. Bridge
B. Station
D. AP-Bridging
Answer: D
A. download
B. upload + download
C. download - upload
D. upload
Penjelasan: Queue merupaka konfigurasi yang digunakan untuk melimit atau membatasi Traffic
entah itu Traffic download ataupun upload. Implementasi pada Queue berdasarkan Hierarchical
Token Bucket(HTB). HTB memungkinkan untuk membuat struktur antrian hirarkis dan
melekat global di berlaku untuk lalu lintas yang diterima oleh router sebelum packet
queue).globa-total:mewakili semua interface input dan output bersama-sama (dengan kata lain
itu adalah agregasi global-in dan global-out). Digunakan dalam kasus ketika pelanggan memiliki
batas tunggal untuk kedua, upload dan download.<Interface name>:merupakan satu antarmuka
keluar tertentu. Hanya traffic ini yang ditujukan untuk pergi keluar melalui antarmuka ini akan
A.system
B.routing
C.multicast
D.wireless
Penjelasan: ROS merupakan singkatan RouterOS. Static Routing sudah termasiuk kedalam
package system
3.When backing up your router by using the Export file command, the following happens:
B. The Export file can be edited with a standard text editor after its creation
Penjelasan: Export file berguna untuk membackup tetapi command ini berbeda backup file jika
backup file tidak dapat dibuka lewat notepad sedangkan Export file dapat dibuka lewat notepad
Penjelasan: Netinstall adalah program yang berjalan pada komputer Windows yang
jaringan Ethernet. Netinstall juga digunakan untuk menginstal ulang RouterOS dalam kasus di
mana instalasi sebelumnya gagal, menjadi rusak atau password akses hilang.Netinstall juga
A. New
B. Syn
C. Related
D. Invalid
E. Established
F. Closed
a. UDP / 5678
b. TCP / 8291
c. TCP / 22
d. TCP / 8080
A./32
B./29
C./30
D./31
8. Router A and B are both running as PPPoE servers on different broadcast domains of your
network. Is it possible to set Router A to use "/ppp secret" accounts from Router B to
NO
9. So that a DHCP Client configuration does not get the gateway information automatically, what
Answer: D
11. Network ready devices are connected directly to MikroTik RouterBOARD 750 with the
correct UTP. RJ45 functioning cable. The device is configured with the IPv4 address
192.168.100.70 by using the subnet mask 255.255.255.252. What will be a valid IPv4 address
a. 192.168.100.70/255.255.255.252
b. 192.168.100.69/255.255.255.252
c. 192.168.100.71/255.255.255.252
d. 192.168.100.68/255.255.255.252
12. How many IP addresses can be used in the 23-bit subnet (255.255.254.0)?
a. 512
b. 510
c. 508
d. 254
13. Is it possible that the same IP address is included in several address lists and can still be used
d. Can deny access to certain domains or servers, but not specific web pages
14. Which of the following protocols / ports is used for SNMP. (Simple Network Management
Protocol)
a. TCP 162
b. UDP 162
c. UDP 161
d. TCP 25
e. TCP 123
f. TCP 161
a. 192.168.0.1
b. 172.168.254.2
c. 172.28.73.21
d. 10,110.50.37
e. 11.63.72.21
16. You want to use PCQ and allow a maximum of 256k downloads and uploads for each client.
17. Which option should you use when you want to prevent access from one particular address to
/ ip route
b. Default-Forwarding can be activated for certain clients through a wireless access list
d. The only way to prevent wireless client connections - disable the wireless interface
20. You want to secure your RouterOS system. You don't want RouterOS to be found using
MNDP or CDP locally. You also want to reject management via MAC addresses on all
1. What does the firewall action "Redirect" do? Select all true statements.
Penjelasan : untuk pppoe dipasang pada interface yang digunakan oleh si client bukan di firewall
maupun ip address
A. /system cron
B. /system watchdog
C. /system scheduler ++
Penjelasan : scheduler itu tugasnya untuk menjadwal kapan settingan itu terjadi
4. It is possible to use WPA and WPA2 authentication type at the same time with one security
profile.
TRUE
Penjelasan : A salah karena reset tidak mungkin hanya menghilangkan password saja, dan b juga
Untuk c dan d karena fungsi netinstall adalah upgrade dan downgrade, dan juga menginstall
ulang
tanpa menghilangkan
A. 16
B. 1 ++
C. 256
D. 8
7. Is it possible to limit how many clients are able to connect to an access point?
B. Yes
Penjelasan : kita bisa membatasinya client yang mengakses sebuah router dengan access list jadi
yang
device nya tercantum di rule access list ia tidak akan bisa mengakses router tersebut
fALSE
Penjelasan : untuk bekerja dengan baik tidak mesti menggunakan bridge, kecuali stasion-bridge
9. The first two rules in the forward chain of the filter table are : /ip firewall filter add
rules above.
True++
False
10. What menu on the proxy that serves to display log information ???
A. Log
B. Service> Log
C. System> Log
D. Logging
Answer: A
11. Two Host, A, and B are connected to broadcast LAN. Select all the answer showing pairs of
IP address/mask which would allow IP connections to be established between the two hosts
13. Which is correct masquerade rule for 192.168.0.0/24 network on the router with outgoing
interface=ether1
A. New ++
B. Invalid ++
C. Related ++
D. Syn
E. Closed
F. Established ++
15. The hotspot feature can be used only on Ethernet interfaces. You have to use a separate
Yes
No ++
16. An IP address pool can contain address from more than one subnet.
True ++
False
18. Which queue-type is suitable for the congested environment but not functional on UDP?
a. RED ++
b. PCQ
c. BFIFO
d. PFIFO
e. SCQ
19. If the client cannot connect to the proxy on port 2 configured by the DHCP Server, what
Answer: B
20. In setting / configuring DNS Servers on proxy, what options do you need to activate so that
B. Cache Size
C. Cache Used
D. Servers
Answer: A
Penjelasan: Access List merupakan sebuah Wireless Tool yang berguna untuk melakukan
Filtering pada AP. Access-List dapat memfilter siapa saja yang bisa connect ke AP melalui MAC
Address maupun Single-Range. Access-List terbagi menjadi 2 yaitu Extended Access-List dan
A.12
B. 9
C.6
D.5
E.7
Penjelasan: Osi layer memiliki 7 model yang terbagi menjadi 2 kubu yaitu kubu Upper Layer
dan Lower Layer. Upper Layer terdapat layer Application, Presentation, dan Session. Sedangkan
Kubu Lower layer terdapat Transport, Network, Data Link, dan Physical
FALSE
Penjelasan: Address Resolution Protokol atau biasa disebut ARP ini biasa dipakai untuk Ipv4
nah jika ARP dipakai untuk Ipv4 terus Ipv6 makenya apa dong?? kalo Ipv6 itu memakai
Neighbor Discovery Protocol atau biasa disebut NDP. NDP berguna untuk mencari node lain,
menentukan alamat node lain dan mencari Router dalam satu lapisan link.
a. 30
b. 1
c. 10
d. 255
Answer: c
5. Which chain firewall will be used to block MSN client traffic on the router?
a. Forward
b. Static
c. Input
d. The output
Answer: a
Penjelasan : MSN client merupakan Aplikasi Chat yang terhubung dari client menuju server
dengan melewati router. artinya trafiknya berupa Forward, karena hanya melewati.
7. RouterBoard must be set so that it boots from the network (ether1), by the way, except:
C. Winbox
D. Mikrotik
A. Layer 2
B. Layer 4
C. Layer 3
D. Layer 1
A. 172.16.0.0-172.31.255.255
B. 10.0.0.0-10.255.255.255
C. 192.168.0.0-192.168.255.255
D. 255.255.0.1-255.255.255.0
A. Web www.mikrotik.com
D. Copy of file
C. Reinstall.
14. The basic firewall in MikroTik is in the IP Firewall Filter Rule. In the firewall filter rule,
A. 2
B. 4
C. 3
D. 5
internet and to synchronize the hours of a computer system over packet switching,
A. 2
B. 3
C. 6
D. 4
A. Suitability Mode
B. Compliance with BAND
C. SSID Compliance
D. DNS suitability
B. Problems on one port / segment will create problems on the port / segment on the same bridge
D. can only work at the Data Link layer, so there is no transmission from one protocol to
another. and bridges are also capable of supporting several protocols such as NetBEUI and LAT
A. PPTP
B. EoIP
C. DNS
D. SSTP
1.Which of the following protocols / port s are used for SNMP. (Simple Network Managemnt
Protocol)?
A.TCP 161
B.TCP 162
C. UDP 161
D.TCP 123
E. UDP 162
F.TCP 25
Penjelasan: SNMP atau Simple Network Management Protocol adalah protokol internet standard
yang digunakan untuk mengumpulkan dan mengorganisir informasi tentang perangkat yang
dikelola di jaringan IP dan untuk memodifikasi inforamsi yang mengubah perilaku perangkat.
A.510
B.254
C.508
D.512
Penjelasan: Yang dimaksud Usable IP adalah IP yang dapat dipakai di subnet 255.255.254.0
berarti soal ini menanyakan jumlah host dalam subnet 255.255.254.0 kamu dapat melihat di
3.How many different priorities can be selected for queues in MikroTik RouterOS?
A. 8
B. 16
C. 0
D. 1
A.16
B.none
C.8
D.32
Penjelasan: IPv4 menggunakan 32 bit dan membatasi ruan address sampai 4294967296 (2^32)
karena keterbatasan IPv4 ini mendorong pembuatan IPv6 pada tahun 1990-an dan secara
komersial digunakan pada tahun 2006 untuk mengetahui lebih lanjut tentang IPv4 kamu dapat
mengklik disini
A. 15.242.55.31-15.242.55.62
B. 15.242.55.32-15.242.55.63
C. 15.242.55.33-15.242.55.62
D. 15.242.55.33-15.242.55.63
Penjelasan: Jika kamu melihat gambar nomer 11 disitu dijelaskan bahwa /27 mempunyai 30 host,
1 network dan broadcast. Jika kita memulai network dari 15.242.55.0 berarti broadcastnya adalah
15.242.55.31 setelah itu kembali lagi ke network berarti network kedua dari /27 adalah
15.242.55.32 dan broadcastnya adalah 15.242.55.63 nah diantara 15.242.55.32 dan 15.242.55.63
itu adalah hostnya. Untuk menjawab soal ini kamu perlu mengerti tentang perhitungan
subnetting.
6. A data packet header is provided for the next process of framming to the next layer to be
transmitted via cable transmission media, the data packet header contains some information
including ...
7. Following are the protocols that are generally used by several applications such as HTTP,
A.TCP
B.UDP
C.ICMP
D.SNMP
B. SSH
C. web based
D. winbox
E. The computer
10. Mikrotik also runs a small ISP, as an experimental medium for the development ...
A. router os software
B. hardware router
C. indoor router
D. ISP router
E. outdoor router
ANSWER: A
ANSWER: A
ANSWER: A
A. netmask
B. gateway
C. dns
D. ip address
E. The router
ANSWER: D
14. The definition for the area served by an 802.11 a / b / g standard wireless LAN access point
is ...
A. netmask
B. gateway
C. dns
D. ip address
E. hostpot
ANSWER: E
15. A rule / standard that regulates or permits communication links and data transfer between
A. client
B. gateway
C. protocol
D. ip address
E. hostpot
ANSWER: C
16. What is the minimum hard drive that can be used to install RouterOS ...
A. 25 mb
B. 1 gb
C. 3 Gb
D. 3 kg
E. 1 Mb
ANSWER: C
A. semarang
B. jakarta
C. klaten
D. jogjakarta
E. bandung
ANSWER: D
18. To create multiple rules, you can use the method ...
A. POR
B. PCQ
C. SFQ
D. IVP
E. SDF
ANSWER: B
19. What menu on the proxy that serves to display log information ???
A. Log
B. System> Log
C. Service> Log
D. Logging
20. Resetting configurations and proxy applications can be done in 3 ways (except)
A. Hard Reset
B. Soft Reset
C. Net Install
D. Flashing
b. POP3 caching
c. SMTP caching
d. FTP caching
3.
4. What protocol does PPP use to identify the Network layer protocol?
a. NCP
b. ISDN
c. HDLC
d. LCP
5. Which of the following commands will allow you to set your Telnet password on a Cisco
router?
a. line telnet 0 4
b. line aux 0 4
c. line vty 0 4
d. line con 0
a. IP
b. TCP
c. UDP
d. ARP
a. show access-lists
b. show interface
c. show ip interface
a. Session layer
b. Physical layer
d. Application layer
b. Stops an interface from sending periodic dynamic updates but not from receiving updates.
10. What does the command routerA(config)#line cons 0 allow you to perform next?
a. 1 only
b. 2 and 3
c. 1 and 4
12. What protocol is used to find the hardware address of a local device?
a. RARP
b. ARP
c. IP
d. ICMP
13. Which of the following protocols uses both TCP and UDP?
a. FTP
b. SMTP
c. Telnet
d. DNS
a. 01xxxxxx
b. 0xxxxxxx
c. 10xxxxxx
d. 110xxxxx
a. 12.0.0.1
b. 168.172.19.39
c. 172.15.14.36
d. 192.168.24.43
16. Which of the following allows a router to respond to an ARP request that is intended for a
remote host?
a. Gateway DP
c. Proxy ARP
17. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD
a. Application
b. Host-to-Host
c. Internet
d. Network Access
18. Which of the following is the decimal and hexadecimal equivalents of the binary number
10011101?
a. 155, 0x9B
b. 157, 0x9D
c. 159, 0x9F
d. 185, 0xB9
19. Which class of IP address provides a maximum of only 254 host addresses per network ID?
a. Class A
b. Class B
b. Class C
d. Class D
20. . If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
a. Application
b. Presentation
c. Session
d. Transport
2.What wireless card can we use to achieve 100 Mbps actual wireless throughput?
A. 802.11 b/g
B. 802.11 a/b/g
C. 802.11 a
D. 802.11 a/n
E. 802.11 a/b/g/n
A.Header
B.Bit
C.Byte
D.Frame
Penjelasan:OSI Layer 1 bertanggung jawab dalam transmisi dan penerimaan data mentah dan
tidak terstruktur dalam media fisik (Device). Transmisi mungkin di definisikan sebagai Simplex,
half Duplex, dan Full Duplex. Protocol data unit yang digunakan OSI Layer 1 adalah Bit.
a. Time to Leave
5.If you need to make sure that one computer in your Hotspot network can access the internet
A.Walled-garden
B.Users
C.IP bindings
D.Walled-garden IP
6. PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there
is a router between server and end-user host, it will not be able to create PPPoE tunnel to that
PPPoE server.
FALSE
7. Is it posible to have PPTP Client an PPTP Server on one MikroTik router at same time?
TRUE
8. The service that automatically gives an IP number to the computer that requests it is
a. TCP
b. IP
c. Server
d. Statis
e. DHCP
9. Switchport mode is
a. The command used in creating VLANs
a. to display options
b. to give an answer
a. house name
A. CLI
B. Config
C. Desktop
D. Physical
E. Service/Software
13. To activate the word secret in the enable command is a function of.
A. Configure Terminal
B. Enable Secret
C. Enable Password
D. Hostname
E. Do show vlan
14. To connect the console cable to the PC administrator you should use the port ..
A. FastEthernet
B. RS 232
C. HDMI
D. USB
E. Telepon
E.ip and Ma
A. IPCONFIG
B.PING
C. Enable password
D. trunking
AE
B.D
C.C
D.B
E.A
A.224-239
B.0-127
C.128.191
D.1-126
E.240-225
19. What is a Bottleneck?
c. Measured with a certain time unit and the network conditions used to transfer files of a certain
size.
transmitter is then received by the broadcast receiver through a broadcast receiver called a
receiver.
e. Narrowing of Paths
b. Network Topology
(36)SIYAMBAHNA IKHWAN
1.Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,
No
A.Accept
B.Add-to-address-list
C.Bounce
D.Tarp
E.Tarpit
F.Log
3.You have 802.11b/g wireless card. What frequencies are available to you?
A.2327MHz
B.5210MHz
C.2412MHz
D.2422MHz
E.5800MHz
False
Penjelasan: Nstreme tidak hanya bekerja pada Channel 40 Mhz, NStreme juga bekerja pada
Channel 20 Mhz, dan 10 Mhz. Channel default dari NStreme adalah 20 Mhz.
5.What Letter appear next to route, which is automatically created by ROS (RouterOS) when
A.C
B.A
C.I
D.D
E.S
6. Configuration action on NAT that functions to configure with the aim to change private ip into
public ip is
A. Redirect
B. Accept
C. Masquerade
D. Etc.-Nat
Answer: C
7. The following are not included in the type options on Hotspot> IP Binding on proxy is ....
A. Bypassed
B. Regular
C. Blocked
D. Filtering
Answer: D
8.Action on filter rules that serves to register website addresses that have been accessed by
Answer: B
9.Packet Flow Filter Rules that enter a router are known as ...
A. Chain = forward
B. Chain = status
C. Chain = output
D. Chain = input
Answer: D
10.The backup / restore feature can be done by uploading backup data to the proxy, so that it is
stored on the storage / storage media for the proxy, uploading the backup file can be done in
Answer: D
11. What is the difference between a user with write and full access on a proxy ???
A. Full & Write has full access rights in the system, and Write can only configure the ip address
B. Full has full access rights to the system, and Write simply cannot reboot, and the addition of
new users
D. Full has full access rights in the system, as well as Write, but write cannot read
Answer: B
12.To configure remote access services and ports on a proxy, if you want to change port 80:
Answer: C
13.Which of the following is not included in the action options in Firewall> Microtic Filters ...
A. Passtrough
B. Return
C. Tarpit
D. Jumping
Answer: D
14.Bandwidth management works with an algorithm that will share bandwidth evenly among a
A. PCQ
B. FIFO
C. SFQ
D. RED
Answer: A
15.The development of the proxy is currently growing rapidly, the proxy can play a role in any
device in the network ranging from routers, bridges, switches, access points, CPE, servers, etc.
A. Radius Hotspot
B. Firewall
C. Routing
D. Bridging
Answer: A
16.The firewall option on the proxy whose job is to create a user log that often pings the router is
...
Answer: C
17.The backup and restore process, can be done through storage stored on proxy memory, this
A. File
B. Remote
C. Disk
D. Hard drive
Answer: A
18.Mikrotik Routerboard does not have a CMOS / battery feature so that the timing of errors
often occurs, so the solution for configuring time on the proxy is automatically saved is using the
A. NTP Client
B. NTP Service
C. SNTP Client
D. SNTP Server
Answer: C
19.How to handle packet storming & Bridge Loops that occur on bridge networks is .....
A. Routing
B. None
C. Settings
D. RSTP
Answer: D
20.Scanner feature on wireless that serves to detect wireless around what is active, what mode
A. Pseudo-bridge
B. Bridge
C. Ap-bridge
D. Station
Answer: D
A. 24 hours
B. Infinite time
C. 1 month
D. 1 year
3. A PC with IP 192.168.1.2 can access internet, and static ARP has been set for that IP address
on gateway. When the PC Ethernet card failed, the user change it with a new card and set the
a. Old static ARP entry on gateway has to be updated for the new card
c. MAC-address of the new card has to be changed to MAC address of old card
4. If a packet comes to a router and starts a new, previously unseen connection, which
A. new
B. established
C. unknown
D. invalid
a. Logical Address
b. Physical Address
c. System Address
d. Unidentified Address
e. Identified Address
7. What is IP Address
a. Logical Address
b. Physical Address
c. System Address
d. Unidentified Address
e. Identified Address
a. Router class
e. Number of channel
a. Router class
e. Number of channel
a. Router class
b. Number of wireless port
e. Number of channel
a. 21
b. 23
c. 25
d. 80
e. 110
a. 21
b. 23
c. 25
d. 80
e. 110
a. 21
b. 23
c. 25
d. 80
e. 110
b. 32
c. 64
d. 128
e. 256
a. 16
b. 32
c. 64
d. 128
e. 256
a. 10.23.13.1
b. 172.40.10.3
c. 192.168.90.20
d. 172.15.90.1
e. 11.12.13.14
a. 10.23.13.1
b. 172.40.10.3
c. 192.168.90.20
d. 172.15.90.1
e. 11.12.13.14
a. Network protection
c. Virus destroyer
2. For static routing functionality, additionally to the RouterOS 'system' package, you will also
A. dhcp
C. routing
D. advanced-tools
B. Deny services (like telnet) only for this user or for one group of users
C. Set max values for total transferred bytes (up- and download)
a. 15.242.55.31-15.242.55.62
b. 15.242.55.33-15.242.55.63
c. 15.242.55.33-15.242.55.62
d. 15.242.55.32-15.242.55.63
5. Mark all statements that are true about / export (rsc file).
What wireless cards can we use to achieve 100 Mbps of actual wireless throughput?
A. 802.11 b / g
C. 802.11 a / n
D. 802.11 a / b / g / n
A.Layer 2
B.Layer 1
C.Layer 6
D.Layer 7
E.Layer 3
7. Is it possible that the same IP address is included in multiple address lists and still be used by
d. Can deny access to a specific domains or servers, but not specific web pages
8. A network ready device is directly connected to a MikroTik RouterBOARD 750 with a correct
U.T.P. RJ45 functioning cable. The device isconfigured with an IPv4 address of 192.168.100.70
using a subnet mask of 255.255.255.252. What will be a valid IPv4 address for
A.192.168.100.69/255.255.255.252
B.192.168.100.70/255.255.255.252
C.192.168.100.71/255.255.255.252
D.192.168.100.68/255.255.255.252
A.G2:60:CF:21:99:H0
B.00:00:5E:80:EE:B0
C.AEC8:21F1:AA44:54FF:1111:DDAE:0212:1201
D.192.168.0.0/16
10. Which computers would be able to communicate directly (without any routers involved):
11. How many layers does Open Systems Interconnection model have?
A.6
B.9
C.5
D.7
E.12
A.4096
B.4094
C.2046
D.2048
E.2047
d. Can deny access to a specific domains or servers, but not specific web pages
15. In MikroTik RouterOS, Layer3 communication between 2 hosts can be achieved by using an
address subnet of :
A./31
B./29
C./32
D./30
A.10.10.14.0
B.192.168.256.1
C.192.168.13.255
D.1.27.14.254
17. How many IP addresses can one find in the header of an IP packet?
A.4
B.2
C.3
D.1
A. 15.242.55.31-15.242.55.62
B. 15.242.55.32-15.242.55.63
C. 15.242.55.33-15.242.55.62
D. 15.242.55.33-15.242.55.63
19. Which is the correct incognito rule for 192.168.0.0/24 networks on routers with outgoing
interface = ether1?
c. / ip firewall nat add action = masquerade out-interface = ether1 chain = dstnat d. / ip firewall
b. 1-2049
c. 1-4096
d. 1-4095
(09)FAIZAL RISSA
a. IP Address
b. Interface Address
c. MAC Address
d. FQDN Address
jawab:c
a. 5560,5620-5700
b. 5640~5680
c. default,5560,5600,5660-5700
d. 5540,5560,5620+570
jawab:a,c
3. Simple Queue number 0 defines 2M for upload and download for target IP 10.10.0.33.
Simple Queue number 1 defines 4M for upload and download for target IP 10.10.0.33. Client
A. 2M upload/download
B. 4M upload/download
C. 0M upload/download
D. 6M upload/download
jawab:a
4. You would like to allow multiple logins with one user name on a HotSpot server. How should
this be configured?
jawab:a
5. What menus should be used to allow certain websites to be accessed from behind a hotspot
a. ip hotspot ip-binding
b. ip hotspot profile
c. ip hotspot walled-garden
d. ip hotspot walled-garden ip
jawab:c
A. 208.10.12.48
B. 208.10.11.46
C. 208.10.12.46
D. 208.10.12.47
Answer Key: D
A. 178.167.10.231
B. 178.167.10.238
C. 178.167.10.236
D. 178.167.10.233
Answer Key: A
A. 10.20.30.32 - 10.20.30.62
B. 10.20.30.33 - 10.20.30.62
C. 10.20.30.33 - 10.20.30.61
D. 10.20.30.32 - 10.20.30.61
Answer Key: B
B. 12.13.13.0
C. 12.13.12.0
D. 12.12.13.0
Answer Key: A
A. 12.13.0.0
B. 12.13.13.0
C. 12.13.12.0
D. 12.12.13.0
Answer Key: A
11. What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized
a. 1 and 3
b. 2 and 4
c. 3 and 4
c. 1 and 2
JAWAB : A
12. What flavor of Network Address Translation can be used to have one IP address allow many
a. NAT
b. Static
c. Dynamic
d. PAT
JAWAB : B
b. B
c. G
d. N
JAWAB : C
14. What PPP protocol provides dynamic addressing, authentication, and multilink?
a. NCP
b. HDLC
c. LCP
d. X.25
JAWAB : C
a. MD
b. CHKDSK
c. DIR
d. CLS
Reason: b). CHKDSK is an external command that functions as checking the free capacity of our
HDD, besides that we can also find out if there is a Bad Sector.
16. Processor Intel Core I7 uses a socket processor with type ...
a. LGA 1156
b. LGA 775
c. AM2 +
d. Socket T
Reason: a). LGA 1156 is a processor socket that can be used by processors such as Core I3, I5,
a. Error on VGA
b. Memory error
c. NIC error
d. Buzzer error
Reason: a). Errors on VGA are usually indicated by the beep 3 times.
18. Programs that can be used to create a file in the form of a presentation are ....
a. VM Ware
b. Macromedia Flash
c. Adobe Photoshop
Reason: d). Microsoft Power Point is one of the programs in Microsoft Office that functions as a
19. On the Debian operating system, the command that we can use to view directory contents is
...
a. LS
b. CLEAR
c. NANO
d. MKDIR
20. To create a partition in Windows 98, we can type the command in the form ...
a. DIR
b. MKDIR
c. FDISK
d. IPCONFIG
Reason: c). FDISK is an external command on SO Windows that serves as the initial ground for
creating partitions.
A. /ip route
3.You need to reboot a RouterBoard after importing a previously exported rsc file to activate the
new configuration.
TRUE
4. What Letter(s) appear next to route, which is automatically created by ROS (RouterOS) when
A. I
B. D
C. A
D. S
E. C
B. Max-limit
C. Target-address, dst-address
A.john trully
B.j.j thomson
C. Arnis Reikstins
A.22
B.80
C. 21
8. FTP connect in layer
A.2
B.3
A. Yes
B. No
A. Connect to OS windows
C.Socket Programming
A.FTP
B.SSH
C.telnet
D.HTTP
A.32
B.4
C.64
D.8
Yes
No
A.www.mikrotik.com
B.http/web ip
C.www.google.com
15. what is the password admin user on the router in default mode?
A.0
B.admin
C.default
D. Blank
A.65525
B.65535
A.well-known ports
B.registered port
C.dynamic port
True
False
A. 1
B. 2
C. 3
A.admin
B.router
C.mikrotik
1. Which option in configuration of a wireless card must be disabled to make router to permit
a. Default Forward
c. Default Authenticate
d. Security Profile
b. TCP/22
c. UDP/5678
d. TCP/8291
3. What kind of users are listed in the Secrets window of the PPP menu?
a. L2TP users
b. PPPOE users
c. Hotspot users
d. PPTP users
e. Winbox users
f. Wireless users
4. You plan to migrate from wireless links using 802.11a at 5GHz (without nstrem) to those
using Nv2 at 5GHz. If you change the AP from 802.11a to Nv2, you don't want the client to
Assuming the client is able to operate with Nv2 (the correct hardware, encryption key and the
correct version of ROS), the settings for 'wireless protocol' must be enabled on the client so that
the client can automatically detect the protocol used by the AP and continue to connect with
a. Nv2
b. nv2-nstreme-802.11
c. anything
d. not determined
5. Is it possible to have PPTP Client and PPTP server on one MikroTik router at the same time?
True
a. Host queue limit 192.168.1.10 uploads data rate to one megabit per second.
b. Queue guarantees data download speeds of one megabits per second for hosts 192.168.1.10
c. Queue guarantees a data upload rate of one megabit per second for hosts 192.168.1.10
d. Queues limit host 192.168.1.10 downloading data rate to one megabit per second.
7. In Winbox, Hide Unchecked Password shows keywords for the following
a. RouterOS Users
b. Hotspot users
8. Which choice should you use when you want to prevent access from one particular address to
9. Which of the following prevents unknown clients from connecting to your AP? Choose the
BEST answer.
a. Check the "Do not allow unknown clients" box in the wireless configuration
b. Uncheck "Default Authenticate" on the wireless card configuration, and add each known client
MAC address to your access list configuration which ensures that you enable "authentication" on
the entry
c. Adding each known client MAC address to your access list configuration is the only step
required
d. Uncheck "Default Authenticate" on the wireless card configuration, and add each known client
10. Can you add the driver manually to RouterOS if your PCI Ethernet card is not recognized,
a. yes
b. No
11. After entering this rule: / ipfirewall add chain = input action = drop, you can still access the
yes
no
12.
13. Where can you monitor (see addresses and ports) the real-time connections processed by the
router?
a. Queue Tree
b. Torch tool
c. Firewall counter
a. SRC-NAT Rules
b. DST-NAT rules
d. Route rules
15. When viewing a route (gateway) in Winbox, some routes (gateway) will display "DAC" in
16. The PPPoE server only works in one Ethernet broadcast domain that is connected to it. If
there is a router between the server and the end-user host, it will not be able to create a PPPoE
False
17. Which configuration menu should you use to change the default Winbox router port?
A. / system resource
B. / ip firewall filter
C. / ip service
D. / ip firewall service-ports
18. The maximum maximum limit (Max-limit) under Simple Queues will limit the upload and
download combined from the target address of your simple queue.
True
19. To use dynamic keys in your wireless security profile for an AP, you MUST set up a dhcp
False
20. How many different priorities can be chosen for Queues (queues) on MikroTik RouterOS?
A. 1
B. 8
C. 0
D. 16
(12)INTHANIA NADICIKA K
A.127.34.155.3
B.192.168.1.4
C.11.3.10.4
D.172.16.13.23
Penjelasan:IP Public adalah IP address yang digunakan untuk lingkup internet, host yang
menggunakan IP public dapat diakses oleh seluruh user yang tergabung diinternet baik secara
langsung maupun tidak langsung (melalui proxy/NAT). Ip PRIVATE ada 3blok yaitu:
3. Router has Wireless and Ethernet client interfaces, all client interfaces are bridged. To create a
DHCP service for all clients you must configure DHCP server on
A. only on bridge interface
5. Which gateway will be used for a packet with destination address 10.1.5.126?
A. 10.1.1.1
B. 10.1.1.2
C. 10.1.5.126
D. 25.1.1.1
security-profile=wpa
security-profile=wpa2
B. Yes, when security profile settings are compatible with each other and Nstreme is enabled or
disabled on
both
Correct Answer: B
7. When backing up your router by using the 'Export' command, the following happens:
B. The Export file can be edited with a standard text editor after its creation
Correct Answer: B
8. In Ip Firewall NAT, you can Classify Traffic in SRC Nat Chain based on " in-interface".
False
9. Which default route will be active? /ip route add disabled=no distance=10
gateway=2.2.2.2
10. Which software version can be installed onto the following RouterBoard types?
A. Routeros-x86-x.xx.npk on a RB1100
B. Routeros-mipsbe-x.xx.npk on a RB133
C. Routeros-mipsle-x.xx.npk on a RB133
D. Routeros-powerpc-x.xx.npk on a RB333
E. Routeros-mipsbe-x.xx.npk on a RB433
A. True
B. False
12. Which features are removed when advanced-tools packages are uninstalled?
A. Neighbors
B. Ip-scan
C. Netwatch
D. LCD support
E. Ping
F. Bandwith-test
13. A proxy that is backed up through the File menu on the Winbox, if not given a name /
identity then by default it will use the name ...
A. Backup Date
C. Identity
D. Unknown backup
Answer: B
A. TRUE
B. FALSE
15. feature to record (display in the log) activities that we want the network
a. firewall loging
b. firewall defender
c. firewall strategy
16. the ability to view connection information such as source and destination IP and port being
a. Address list
b. Block account
c. connection tracking
source NAT or srcnat -> applies to packets originating from NAT-based networks (private / local
network)
destination NAT or dstnat -> applies to packets going to the NAT network, usually used to
A. TRUE
B. FALSE
NAT = yes
a. 192.168.88.1/24
b. 192.168.88.0/24
c. 192.168.10.1/24
d. DHCP Client
19. If you notice any changes in the color of the Queue rule icon. what the red queue rule means
is ...
20. What tools are used to check bandwidth traffic between proxy routers?
A. Telnet
B. Bandwidth
D. Speedtest
Answer: B
1.Action=redirect is applied in
A. chain=srcnat
B. chain=dstnat
C. chain=forward
JAWAB : B
4. Which gateway will be used for packets with the destination address 10.1.5.126?
A. 25.1.1.1
B. 10.1.1.2
C. 10.1.5.126
D. 10.1.1.1
A. FDD
B. CSMA / CA
C. CDMA
D. CSMA / CD
6. Mark all correct statements about / export file = {name of an rsc file}.
False
A. log
B. tarp
C. bounce
D. accept
E. Add-to-list
F. tarpit
9. What firewall actions do "Redirect"? Select all statements that are true
A. Redirects a packet to a specified port on the router (Switches packets to a specific port
on the router)
A. UDP 1721
B. TCP 1723
C. UDP 1723
D. TCP 1721
11. How many DHCP servers can be configured per interface on RouterOS?
A. Two
B. One
C. Unlimited
D. Five
B. Could die
A. Correct
B. Incorrect
14. To make all DNS requests come from your network to complete them on your router
(regardless of client configuration), which actions will you specify for the DST-NAT rule?
A. Disguised
B.Dst-nat
D. Transfer
15. The first two rules in the forward chain from the filter table are: / ip firewall filter add chain
= forward connection-state = specify action = accept / ip firewall filter add chain = forward
connection-state = invalid action = dropconnection-state = related packet not filtered by the rules
above
A. Correct
B. Incorrect
A. Shows a list of Client's MAC addresses that are already registered with the AP
C. Handling the Client's MAC Address list to allow / deny connections to the AP
17. If the router login password is lost, need to reinstall RouterOS or use the hardware reset
function.
A. Correct
B. Incorrect
A. Tharpite
B.Tarp
C.Bull
D. Add-to-address-list
E. Log
F. Receive
19. Which version of software can be installed on the following RouterBoard types?
A.Routeros-x86-x.xx.npk on RB1100
B.Routeros-mipsbe-x.xx.npk on RB133
C.Routeros-mipsle-x.xx.npk on RB133
D.Routeros-powerpc-x.xx.npk on RB333
E.Routeros-mipsbe-x.xx.npk on RB433
A. L2TP Client
B. Router Users
C. PPTP Clients
D. PPP Clients
E. IPSec Clients
F. PPPoE Client
[single answer]
a. 2047
b. 4096
c. 2048
d. 2046
e. 4094
JAWAB : E
2. What is the default TTL (time to live) on a router that an IP packet can experience before it
will be discarded ?
[multiple answers]
a. 60
b. 30
c. 1
d. 64
[multiple answers]
a. 192.168.13.255
b. 1.27.14.254
c. 10.10.14.0
d. 192.168.256.1
JAWAB : B,C
to-address=192.168.1.2 to-ports=81
b. Forwards any TCP traffic incoming through ether1 port 3389 to the port 81 of the internal host
192.168.1.2
c. Forwards all TCP traffic from 192.168.1.2 to port 81 of the interface ether1
d. Forwards any TCP traffic incoming through ether1 port 81 to the port 3389 of the internal host
192.168.1.2
Jawab:b
[single answer]
a. UDP
b. TCP
c. ARP
d. ICMP
JAWAB : D
6.The following is what parameters we need to do when wanting to configure email tools on the
A. Subject
B. Start TLS
C. Port
D. Server
Answer: A
7.What parameters do we need to set in the Netwatch tool to identify a host in the Down /
A. Interval
B. Timeout
D. Since
Answer: B
8.What tools are used to display information about graphic statistics of cpu resource usage,
A. Graphing
B. Graph
C. Graphs
D. Statistics
Answer: A
9.The following are the direction options on the bandwidth test tools on the proxy winbox that
function to regulate the sending and receiving bandwidth methods, are ...
A. Up / Down
B. Tx / Rx
C. Send / Receive
D. Upload / Download
Answer: C
10.What tools are used to scan active IP address information on a local area network interface /
network?
A. IP Scanner
B. IP Scan
C. IP Scanner
D. Network Scanner
Answer: B
11.Which queue-type is suitable for the congested environment but not functional on UDP?
A. SCQ
B. PCQ
C. FIFO
D. RED
Answer : D
A. 3128
B. 115200
C. 8291
D. 11520
Answer : B
13.Which option should you use when you want to prevent access from one specific address to
Answer: B
14.PPP Secret is a security method on microtic, PPP Secret can be used in the following
A. L2TP
B. PPPoe
C. OVPN
D. SSTP
Answer: C
15.It is possible to access MikroTik Graphs on a different port than HTTP port 80
a. Yes
b. No
16.In the wireless menu do we access information about the number of clients connected to the
proxy ????
A. Registration
B. Security Profile
C. Connection List
D. Access List
Answer: A
a. Virtual Teletype
b. Virtual To YOU
d. Vlan To Young
a. English
b. australia
c. Singapore
d. Indonesia
e. Japan
A. Unlimited
B. 2048
C. 8192
D. 10240
2. What is the default TTL (time to live) on a router that an IP packet can experience before it
will be discarded?
A.6O
B.30
C.1
D.64
A.Header
B.Bit
C.Byte
D.Frame
A 254
B. 510
C 512
D. 508
A 126
B. 510
C 512
D. 508
A 62
B. 510
C 512
D. 508
A 254
B. 510
C 512
D. 30
A 14
B. 510
C 512
D. 508
A6
B. 510
C 512
D. 508
10. How many usable IP addresses are there in a 30-bit (255.255.255.252) subnet?
A2
B. 510
C 512
D. 508
11. How many usable IP addresses are there in a 20-bit (255.255.240.0) subnet?
A 4094
B. 510
C 512
A.255.192.0.0
B.255.255.224.0
C.192.0.0.0
D.255.255.192.255
TRUE
FALSE
14. Level 1 (demo); at this level you can use it as a standard routing function with only 1 setting
TRUE
FALSE
15. Level 6 license covers all levels and does not have any limitations
TRUE
FALSE
16.. Level 5 licenses cover levels 1, 3 and 4 plus the ability to manage more hotspot users
TRUE
FALSE
17. To check the user who is currently logged into the proxy through winbox, ssh, and webfig
Answer: D
18. What protocol and port are used by the NTP time configuration application ???
A. UDP 123
B. TCP 321
C. UDP 321
D. TCP 123
Answer: A
19. What status is displayed in the DHCP Client status, when successfully obtaining dynamic IP
addresses ...
A. Success
B. Bound
C. Start
D. Bounding
Answer: B
20. The menu on the winbox that functions to view the proxy configuration tutorial on the
webbrowser is ....
A. Make Supout.rif
B. Manual
C. Mikrotik Wiki
D. System> Manual
Answer: B
(05)CAECARRYO BAGUS D
Penjelasan:DHCP Client dapat diaktifkan di setiap antarmuka Ethernet seperti pada suatu waktu.
DHCP Client akan menerima Ip Address,netmask, gateway default, dan dua alamat dns server.
Uptime Limit akan diterima oleh DHCP Client jika Router yang mesetting DHCP Server juga
menyeting Hotspot.
Penjelasan: queue berguna untuk melimit traffic. implementasi Queue di MikroTik RouterOS
berdasarkan Hierarchical Token Bucket (HTB). HTB memungkinkan untuk membuat struktur
antrian hirarkis dan menentukan hubungan antara antrian. Queue memiliki 4 type yaitu
SFQ,PCQ,RED dan FIFO. FIFO terbagi lagi menjadi 3 yaitu BFIFO,PFIFO, dan MQ PFIFO.
D. Internet
ANSWER: C
4. Servers that can create Unix-based systems (such as Linux) to share resources with
A. Samba
B. Apache
C. Squid
D. Squirel
E. Proxy
ANSWER: A
A. chmod
B. squid
C. chdisk
D. short
E. telnet
ANSWER: A
6. To detect whether the connection between the computer and the network is going well, the
utility used is ...
A. ls
B. clear
C. man
D. tracert
E. ping
A. ifconfig
B. ipconfig
C. isconfig
D. cpconfig
E. lsconfig
ANSWER: B
ANSWER: E
9. The 32 bit number used to distinguish Net ID and Host ID is called .....
A. Subnet Mask
B. Submask
C. IP Broadcast
D. Public IP
E. Private IP
ANSWER: A
10. The default partition (root) type Reiserfs is used by the operating system ...
A. Windows XP
B. Linux Redhat
C. Windows ME
D. Linux Suse
E. Linux Ubuntu
ANSWER: D
A. Linux Travolds
B. Linux Torvalds
C. Linus Torvalds
D. Linux Travolta
E. Linus Travolta
ANSWER: C
A. dir
B. cd
C. copy
D. rd
E. md
ANSWER: E
A. mkdir
B. cd
C. mdir
D. rd
E. dir
ANSWER: A
14. The command used to view the list of services in Windows XP is ...
A. services.exe
B. services.asc
C. services.msa
D. services.dll
E. services.msc
ANSWER: E
A. #
B. @
C. $
D. *. *
E. ^
ANSWER: A
A. rmove
B. rmdir
C. mkdir
D. mdel
E. msdir
ANSWER: B
17. Software to manage the layout of files on the hard drive which is the default from Windows
XP is .....
A. disk defragmenter
B. disk formater
C. disk cleaner
D. disk destructor
E. disk partitioner
ANSWER: A
18. Linux can be used by more than one user who enters the system at the same time, termed ...
A. Multiuser
B. Multilevel
C. Multipeople
D. Multimaker
E. Multigetting
ANSWER: A
A. Ubuntu
B. Windows XP
C. Mac OS
D. Cytrix
E. Red Hat
ANSWER: D
20. A network where each computer can function as a server means that a computer user on the
C. Internet network
ANSWER: A
(30)SABITHA AULIA N
1.Which option in the configuration of a wireless card must be disabled to cause the router to
A.Default Forward
C.Default Authenticate
D.Security Profile’
oleh Router jika mode ini di non aktifkan maka kita dapat menentukan Kebijakan klient boleh
terkoneksi ke Access Point atau tidak. Jika ingin terkoneksi ke Access Poitn maka pastikan
terlebih dahulu Mac Address Device kamu sudah terdaftar apa belum di Access List jika belum
2.It is necessary to configure a local DNS server to be able to give out a DNS setting to clients
TRUE
Penjelasan: Jawabannya true karena DHCP dapat mengirim DNS server untuk client. DHCP
Server akan mengirim DNS Server ke client dan karena DHCP Client menerima Ip
Address,netmask, gateway default, dan dua alamat dns server maka DNS Server akan langsung
3.To make all DNS requests coming from your network to resolve on your router (regardless of
the clients’ configuration), which action would you specify for the DST-NAT rule?
A. masquerade
B. dst-nat
D. Redirect
4.Is it posible to have PPTP Client an PPTP Server on one MikroTik router at same time?
TRUE
5.You want to use PCQ and allow 256k maximum download and upload for each client. Choose
Penjelasan: Soal Mikrotik biasanya diperlukan ketelitian saat menjawab karena beberapa soal
dari Mikrotik ada yang menjebak. Nah, termasuk soal ini diperlukan ketelitian. Soal meminta
traffic untuk Download dan Upload sebesar 256K jika ini soal yang memerlukan jawaban
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
ANSWER: E
7. Signal through 2 directions with one cable, the possibility of collision (data collision or data
A. Coaxial
B. UTP
C. STP
D. Twisted
E. Unshielded
ANSWER: A
A. Type
B. Topology
C. Geography
D. Scalability
E. Transmission media
ANSWER: B
A. Division
B. Partition
C. Kernel
D. File system
E. Operating System
ANSWER: B
10. The ability of the operating system to run various commands at the same time is called .....
A. Multi user
B. Pipelining
C. Threading
D. Multitasking
E. Management
ANSWER: D
A. Core
B. Linux
C. Kernel
D. Compiler
E. Windows
ANSWER: C
12. The command text for viewing the routing table in Windows is .....
A. route –n
B. route –a
C. route PRINT
D. route –D
E. route -t
ANSWER: C
13. Computers in charge of storing information on web pages that have been accessed before are
.....
A. Router
B. Web server
C. Proxy server
D. Name server
E. Database server
ANSWER: C
14. The front desk in charge of translating the smallest unit of information in the physical layer is
.....
A. LAN Card
B. USB
C. RJ 45
D. Firewire
E. UTP cable
ANSWER: A
A. Bit
B. Bytes
C. Label
D. Packet
E. Segment
ANSWER: A
16. .According to the OSI reference, the protocol layers are numbered .....
A. 3
B. 4
C. 5
D. 6
E. 7
ANSWER: E
17. A rule whereby the program owner retains his rights but other people are allowed to
distribute and modify, provided that the original source code must be included in the distribution
called .....
ANSWER: A
18. Which is not a variant of the GUI-based network operating system that uses a Linux base is
.....
A. Redhat
B. Mandrake
C. Caldera
D. Debian
E. Fortran
ANSWER: E
ANSWER: C
20. The tool that functions to connect 1 PC with another PC in a local network that is "Manage"
is ...
a. Router
b. Switch
c. Bridge
d. Access point
e. LAN card
jawaban : B
A. ap-bridge
B. nstreme-dual-slave
C. bridge
D. station-wds
E. Station
Penjelasan: WDS adalah dimana Station dapat menjadi AP dalam satu waktu namun dengan
konsekuensi Bandwidth berkurang 50%. dan untuk membuat WDS kita membutuhkan mode
wireless: Bridge, AP-Bridge, WDS-Slave, dan Station-WDS untuk mengetahui lebih lanjut
2.You need to set up an E1(T1) connection with PPP configured. Which License level is needed?
A.Level 4
C.Level 5
Penjelasan:E1 adalah setandar yang dipakai di Eropa dan dipakai juga di Indonesia sedangkan
a. 95:B5D:EE:78:8A
b. 13:16:86:53:89:43
c. 80:GF:AA:67:13:5D
d. 88:0C:00:99:5F:EF
e. EA:BA:AA:EE:FF:CB
Penjelasan: MAC address menggunakan Hexa desimal yang dimana maksimalnya adalah huruf
4.When sending out an ARP request, an IP host is expecting what kind of address for an answer?
A. VLAN ID
B. IP address
C. MAC Address
D. 802.11g
Penjelasan: ARP berguna untuk pemetaan dari tingkat OSI layer 3 ip address ke OSI Layer 2
Mac Address. ARP digunakan hanya di Ipv4 sedangkan untuk Ipv6 menggunakan protokol NDP
5. In case when router login password is lostm it is necessary to reinstall RouterOS or use
hardware reset function.
A.True
B.False
Answer : True
A.115200
B.11520
C.3128
D.8291
8. The first two rules in the forward chain of the filter table are :/ip firewall filter add
rules above
A.True
B.False
10. An IP address pool can contain address from more than one subnet
A. True
B.False
B.False
12. To make all DNS request coming from your network to resolve on your router (regardless of
clients configuration), which action would you specify for the DST-NAT rule?
B.Dst-nat
C.Redirect
D.Masquerade
gateway=2.2.2.2
14. For static routing functionality, additionally to the RouterOS system package, you will also
A.None
B.Dhcp
C.Advance-tools
D.Routing
15. WPA 2 Pre Shared key (PSK) is enabled on AP, all your clients have to use the same PSK.
Only Virtual AP could be used to allow clients to connect with a different PSK.
A.True
B.False
16. Which options should be used when you want to prevent access from one spesific address to
B. None metode
C. privat/local network
A. Dst-nat
B.Same
C. Netmap
A. manual-tx-power
B. established
C. WDS-slave
D. station-pseudobridge
20. The WPA 2 Pre Shared (PSK) key is activated on the AP, all your clients must use the same
PSK. Only Virtual AP can be used to allow clients to connect with different CSWs.
A. Correct
B. Incorrect
1.A backup file from a MikroTik router is stored in plain text format
False/truth
2. The following, which are not included in the proxy application package are ...
A. System
B. Hotspot
C. Dhcp
D. Mipsbe
3. Which of the following actions are available for '/ip firewall mangle' (select all valid actions)
A. change MSS
B. mark connection
D. Jump
E. Drop
F. mark packet
A. ap-bridge
B. nstreme-dual-slave
C. bridge
D. station-wds
E. Station
5. RouterOS Mikrotik x86 version is a proxy version that can only be used on devices ..
A. Komputer / PC
B. Routerboard
C. Router Wireless
D. Wireless Outdoor
6. Options that need to be selected when you want to disable a package on the proxy can be done
A.Disable
B.Downgrade
C.Enable
D.Uninstall
A.OSI
B.ISO
C.IEEE
D.IETF
8. The bits are grouped into frames for further processing at the next layer, this process is known
A.Data Link
B.Physical
C.Network
D.Transport
9. The following are included as the default port of the Winbox application is ....
A.8291
B.8292
C.8080
D.8921
10. Basically a router functions to connect networks that have different IP addresses, routers
A. Data Link
B. Network
C. Physical
D. Transport
11. The division of a network address, into smaller network groups, it aims to divide and group
A. Subnet
B. Host ID
C. Network ID
D. Netmask
12. What service uses TCP protocol and uses port 161
A. SMTP
B. SNMP
C. NTP
D. POP3
13. Service that uses UDP protocol and port 53 as communication media is ...
A. DNS
B. FTP
C. SNMP
D. SMTP
14. The fundamental difference between Telnet and SSH remote access applications is the aspect
...........
A. Security
B. Speed
C. Beauty
D. Mercy
15. To access a proxy via the Webfig path we need an application ......
A. Winbox
B. Putty
C. Web browser
D. Telne
16. The default configuration for a proxy is as follows: ether 1: dhcp clientbridge 1:
ether2-ether3-ether4-ether5, dstip address bridge: ??????? dhcp server: bridge1NAT = yes What
A. 192.168.88.1/24
B. 192.168.88.0/24
C. 192.168.10.1/24
D. DHCP Client
17. To configure remote access services and ports on a proxy, if you want to change port 80:
18. The easiest way to configure a routerboard microtic device is to use ...
A. CLI / Text
B. Winbox
C. Webfig
D. Quick Set
19. Installing the proxy router OS on a PC can be done using cdrom, the type of routeros that
must be used is ....
A. Routeros-mipsbe
B. Routeros-smips
C. Routeros-ppc
D. Routeros-x86
20. To access the proxy in text mode using the SSH / Telnet feature, we need client applications
like puTTY and others, the next thing that needs to be known before the remote process is done
....
A. IP Address
B. MAC Address
C. Network Address
D. Subnet
(06)DANDY SATRIA W
1.What configuration was added by the / ip hotspot setup command? (Select all that apply)
a. / pohon antrian
b. / ip hotspot berdinding-kebun
c. / ipdhcp-server
d. / ip hotspot user
2. Can you add drivers manually to RouterOS if your PCI Ethernet card is not recognized, and
a. Yes
b. No
a. 5540,5560,5620 + 5700
b. 5640 ~ 5680
c. 5560,5620-5700
d. default, 5560.5600,5660-5700
4. For static routing functionality, in addition to the RouterOS system package, you also need the
b. sophisticated tool
c. dhcp
d. route
a. 1-2048
b. 1-4096
c. 1-2049
d. 1-4095
6.What protocol can we choose, to conduct bandwidth tests on the proxy winbox ...
A. DHCP
B. ARP
C. ICMP
D. UDP
Answer: D
7.Which package is stored on the Application tools on the routerboard proxy, ...
A. Routing
B. DHCP
C. Firewall
D. System
Answer: D
8.What is the feature in the proxy winbox that functions to monitor in real time the condition of a
A. Graphing
B. Watchdog
C. Netwatch
D. Ping Test
Answer: C
9.What tools are often used to view statistics and data traffic in the form of src & etc addresses,
bandwidth usage, protocols, ports, etc. on an interface / IP address in realtime ...
A. Firewall
B. Tools
C. Torch
D. Torching
Answer: C
10.Here are some parameters that do not need to be included in the process of using bandwidth
test tools:
A. Test To
B. Direction
C. Lost Packet
D. Protocol
Answer: C
11.What tools are in the winbox that functions to analyze data packets that enter and pass
A. Traffic Generator
B. Packet Sniffer
C. Packet Filtering
D. Traffic Monitor
Answer: B
12.If we want to configure a netwatch to check the active status of a host on the network, within
A. Timeout
B. Intervals
C. Since
D. Host
Answer: B
13.To display information about graphics CPU usage, and memory on graphing tools on the
B. Interface Rules
C. Interface Graphs
D. Queue Rule
Answer: A
14.To monitor a host using netwatch tools, what parameter information do we need to enter in
A. Status
B. Host
C. Intervals
D. Timeout
Answer: B
15.A host that is monitored using netwatch tools has two statuses that can identify a host on or
A. On / Off
B. Active / Nonactive
C. Download / Upload
D. Up / Down
Answer: D
ANSWER: A
A. Host ID
B. Network ID
C. Subnet Mask
D. Broadcast Address
E. Network Address
Answer: C
18.To access other computers, SSH is safer than telnet because the data will be sent ...
A. smaller
B. greater
C. made parallel
D. scrambled first
E. Formatted first
ANSWER: D
A. chmod
B. squid
C. chdisk
D. short
E. telnet
ANSWER: A
ANSWER: E
(11)HAIKAL HUMAM
A. ip routing
B. interface
C. firewall
D. bandwith manangement
E. prosessing
A. network router
B. network komputer
C. ip addres
D. gateway
E. network pc
3. When backing up your router by using the Exporf command, the following happens
B. The Export file can be edited with a standard text editor after its creation
Penjelasan : ketika kita membuat export file, kita akan diminta untuk memasukan nama file
tersebut, bisa juga lebih spesifik lagi, dan kita bisa mengedit nya di notepad
A. telnet
B. SSH
C. web based
D. winbox
E. computer
A. neighbors
B. LCD support
C. ip-scan
D. ping
E. netwatch
F. bandwidth-test
A. kdps
B. mega byte
C. bit/second
D. byte/second
E. mega byte
A. download
B. share
C. netinstall
D. copy
E. setting
9. Mikrotik also runs a small ISP, as a trial media for development ...
A. router os software
B. router hardware
C. router indoor
D. router ISP
E. router outdoor
10. Rules / standards that govern or allow communication links and data transfers between two
A. client
B. gateway
C. protocol
D. ip address
E. hostpot
11. You have an 802.11b / g wireless card. What frequency is available for you?
a. 5800MHz
b. 2412MHz*
c. 5210MHz
d. 2422MHz
e. 2327MHz
a. WDS between devices in station-wds mode and devices in station wds mode
b. Encryption
c. WDS between the device in ap-bridge mode and the device in wds station mode*
14. Can you add drivers manually to RouterOS if your PCI Ethernet card is not recognized, and
a. Yes
b. No*
a. True
b. False*
16. On MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved using
a. / 30*
b. / 29*
c. / 32*
d. / 31
a. 2047
b. 4096
c. 2048
d. 2046
e. 4094*
a. 1-2049
b. 1-4096
c. 1-4095*
d. 1-2048
a. True
b. False*
a. TCP 8291*
b. TCP 80
c. UDP 8291
d. TCP 8192
(04)BIKO YOGA H
A.Router’s webpage
D.mikrotik.com
kamu tidak dapat menemukan Winbox di Menu files di dalam Router maupun lewat kabel
console
A.Max-limit
D.Target-address, dst-address
A.Chain=srcnat
B.Chain=foward
C.Chain=dstnat
4. Which queue-type is suitable for congested environment but not good on UDP?
A.SCQ
B.PCQ
C.RED
D.BFIFO
E.PFIFO
A.Hard Reset
B.Soft Reset
C.Net Install
D.Flashing
6. When resetting the proxy configuration, the routerboard will reboot, after the reboot process,
A.Blank
B.Dynamic
C.192.168.88.1
D.192.168.1.1
7. Next, are the configuration options not found in the System configuration menu> Reset
Configuration ...
A.Keep User Configuration
C.Don't Backup
8. Before doing the netinstall process on the proxy, what configuration do we need to do ???
C.Configuring Netbooting
A.System> Identity
B.System> Identity
C.Tool> Identity
10. Which of the following menus / sections does the routerboard identity ???
B.Terminal Console
C.Web page
11. The process of accessing the proxy to the router based on user and group settings, the user
A.System> User
B.Tool> User
C.Mikrotik> User
D.Terminal> User
12. In the menu, do we see dynamic IP address information (DHCP Client) received by the
A. Status
B. Renew
C. Copy
D. Release
Answer: A
13. PPP Secret is a security method on microtic, PPP Secret can be used in the following
A. PPPoe
B. SSTP
C. OVPN
D. L2TP
Answer: C
A. Default Authenticate
B. Security Profile
C. Authenticate
D. SSID
Answer: B
15. Two Host, A and B, are connected to broadcast LAN. Select all the answer showing pairs of
IP address/mask which would allow IP connections to be established between the two hosts
B.Max-limit
C.Target-address, dst-address
A. semarang
B. jakarta
C. klaten
D. jogjakarta
E. bandung
A. chain = srcnat
B. chain = dstnat
C. chain = forward
D. chain = backward
E. chain = rear
A. POR
B. PCQ
C. SFQ
D. IVP
E. SDF
(01)AINUR HAFID A
1.You have to connect to a RouterBOARD without any previous configuration. Select all
A. Serial Connection
B. MAC-Winbox
C. Attach monitor/keyboard
D. Telnet
Penjelasan: Mikrotik mempunyai Ip default dan kamu bisa memakai Ip Defaultnya untuk login
flags mean:
3.Which of these are possible solutions to bridge two networks over a wireless link:
5. When backing up your router by using the ‘Export’ command, the following happens:
B. The Export file can be edited with a standard text editor after its creation
6. Consider the following network diagram. In R1, you have the following configuration:
/ ip route
/ ip firewall nat
In R2, if you want to prevent all access to the server located on 192.168.1.10 from LAN1
action = drop
b. / ip firewall filter add chain = enter src-address = 192.168.99.1 etc-address = 192.168.1.10
action = drop
action = drop
7. In the advanced menu of the wireless setup there is a parameter called "Area", it works
directly with:
a. Link List
b. Access list
d. Security Profile
8. What menu should be used to allow certain websites to be accessed from behind the hotspot
a. ip hotspot ip-binding
b. hotspot ip profile
d. ip hotspot
10. Which of these solutions is a possible solution for bridging two networks through a wireless
link:
b. Export files can be edited with a standard text editor after creation
12. You need to reboot RouterBoard after importing the previously exported rsc file to activate
True
False
13. It is not possible to disable the "admin" user on the "/ user" menu
True
False
14. If a packet enters the router and starts a new connection that was not previously seen, which
connection state it is
b. new
c. unknown
d. invalid
e. established
15. We have two radio cards in a point-to-point connection with the settings:
security-profile = wpa
security-profile = wpa2
b. Yes, if the security profile settings are compatible with each other and Nstreme is activated or
deactivated in both
cases c. No, because of different frequencies
16.There are two mediums of communication in the network namely cable and wireless
True
False
Answer: True
17.2 Types of data transmission cables that Telkom uses to meet customer demand are?
A. Wired
B. Wireless
C. DSL / Copper
D. Optical Fiber
Answer: C, D
A. 192.168.10.1
B. 192.168.2.1
C. 192.168.1.1
D. 192.168.100.1
Answer: C, D
19.To facilitate the transfer of IPTV to Telkom Indonesia customers, it provides a tool called
True
False
Answer: False
A. Peter Alvin
B. John Trully
C. Arnis Riekstins
D. Tjahyo Kumolo
Answer: B, C
(07)DAYANG RAHMAWATI
d. Programs that make requests for content from the Internet / Intranet
answer b). Controlling and managing network traffic is one function of a Firewall
2. The tool that functions to connect 2 networks with different segments is ...
a. Router
b. The switch
c. The hub
d. Access Point
answer a). Router is a hardware / device that functions to connect 2 or more networks with
different segments.
3. Which firewall chain would be used to block a client's MSN traffic on a router?
a. output
b. static
c. input
d. forward
True
False
a. target-address, max-limit
c. target-address, etc-address
d. maximum limit
Answer: A
6. Routers A and B both run as PPPoE servers on a broadcast domain that is different from your
network. Is it possible to set Router A to use the "/ ppp secret" account from Router B to
a. yes
b. No
7. The MikroTik RouterOS DHCP client can accept the following options.
a. Border Byte
b. Gateway IP
c. Tariff limit
d. Uptime Limit
8. The results of the proxy backup process are encrypted and can only be restored on a proxy that
A. .rsc
B. .bck
C. .Backup
D. .npk
Answer: C
A. VPN Tunnel
B. PPTP
C. PPoE
D. EoIP
Answer: D
10. Installing the proxy router OS on the routerboard can be done with ...
ANSWER: D
11. The easiest way to configure a routerboard microtic device is to use ....
A. CLI / Text
B. Quick Set
C. Webfig
D. Winbox
Answer: D
12. Network devices that function as network routers, bandwidth management, proxy servers,
dhcp, dns servers and can also function as hotspot servers are ...
A. server
B. gateway
C. routerBoard
D. pc
E. client
ANSWER: C
13. mikrotik also runs a small ISP, as a trial medium for the development ...
A. router os software
B. hardware router
C. indoor router
D. ISP router
E. outdoor router
ANSWER: A
14. If we want to create a user on a proxy that can only be accessed through certain IP addresses,
A. Allow Address
B. Allowed Address
C. Name Address
D. Group Address
Answer: B
15. Users in the proxy are categorized into several groups according to their access rights, the
A. Root
B. Full
C. Read
D. Write
Answer: A
16. If we want to configure the service and winbox port can access via the IP menu> Services,
but if we only want to activate a specific service for certain IP addresses, then the option we have
to configure is ...
A. Access Address
B. Allowed Address
C. Available Address
D. Available From
Answer: D
17. The parameter in the Firewall that functions to create / group multiple IP addresses into a
A. Address List
B. NAT
C. Layer 7 Protocol
D. Filters
Answer: A
18. The backup method, which can partially back up configuration or entire proxy configuration,
can be done via the new terminal, using the command ....
A. Restore
B. Import
C. Export
D. Backup
Answer: C
Answer: D
20. The technique used to expand a network from an access point without using a cable as is
normally done with a wired network, so that all wireless devices can be connected and
A. AP-Bridge Dynamic
D. CAPSman
Answer: C
(16)MOCHAMMAD AZIIZ N
A. S = Static
B. D = Drop
C. C = Connected
D. A = Active
2.Can you limit how many clients than are able to connect to access point (routeros)?
C. Yes
3. Is it possible for a client to get an IP address but no gateway after a successful DHCP request?
FALSE
4. The hotspot feature can be used only on ethernet interfaces. You have to use a separate access
5. Which of the following protocols / port s are used for SNMP. (Simple Network Management
Protocol)
a. TCP 162
b. UDP 162
c. UDP 161
d. TCP 25
e. TCP 123
f. TCP 161
6. Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,
a. Yes
b. No
a. client’s address
c. server’s address
/ip route
11. In which order are the entries in Access List and Connect List processed?
a. In sequence order
b. In a random order
d. By interface name
12. You can not use OSPF and RIP routing protocols simultaneously on the RouterOS.
a. Yes/ True
b. No/ False
13. While troubleshooting a network from inside the network, you discover that you can ping the
gateway reliably, but you cannot browse the Internet. Skype, however, works flawlessly. What is
14. You are planning a migration from a wireless link using 802.11a on 5GHz (with no nstreme)
to one using Nv2 on 5GHz. When you change the AP from 802.11a to Nv2, you do not wish a
client to disconnect for more than a few seconds during the upgrade.
Assuming the client is capable of operating with Nv2 (correct hardware, correct encryption key
and ROS version), which setting(s) for 'wireless-protocol' should be enabled on the client so that
the client can auto-detect the protocol used by the AP and still make connection with 802.11a or
b. nv2-nstreme-802.11
c. any
d. unspecified
In order for Router 1 to see all of the networks the following commands could be used (choose
dst-address=172.32.0.0/24 gateway=10.10.0.2
dst-address=172.32.0.0/24 gateway=10.50.0.2
a.Yes
b.No
17. In Winbox, Hide Passwords unchecked shows passwords for the following
a. RouterOS user
b. Hotspot User
d. PPP secrets
18. Which options should be used when you want to prevent access from one specific address to
19. Which of the following would prevent unknown clients from connecting to your AP? Choose
b. Uncheck "Default Authenticate" in the wireless card configuration, and add each known
client's MAC address to your access-list configuration ensuring that you enable "authenticate" in
the entry
c. Add each known client's MAC address to your access-list configuration is the only step
needed
d. Uncheck "Default Authenticate" in the wireless card configuration, and add each known
a. bridge
b. nstreme-dual-slave
c. station-wds
d. ap-bridge
e. station
1.You want to use PCQ and allow a maximum of 256k downloads and uploads for each client.
answer: b, d
b. Save the configuration, but reset the admin password that is missing
answer: a, c
4. What letters appear next to the route, which is automatically created by RouterOS when the
A.A
B. C
C. S
D. I
E. D
Answer: e, a, b
answer: a, d
activate (uncheck).
true
false
a. 1
b. 2
c. 3
d. 4
a. UDP 1701.
b. TCP 1701
c. UDP 1702
d. TCP 1702
yes
no
a. 1
b. 2
c. 3
d. 4
a. WPA PSK
b. WPA EAP
c. tkip
d. aes ccm
a. WPA PSK
b. WPA EAP
c. tkip
yes
no
a. access points
b. connect list
c. access list
15. whether the strength of the signal strength can affect the data rate
yes
no
a. a scan
b. sniff
c. snooper
d. signal
17. Next, are the configuration options not found in the System configuration menu> Reset
Configuration ...
B. No Default Configuration
C. Don't Backup
18. Before doing the netinstall process on the proxy, what configuration do we need to do ???
A. Do a Hard Reset
B. Do a Soft Reset
C. Configuring Netbooting
A. System> Identity
B. System> Identity
C. Tool> Identity
20. The following are options that will not be asked during the IP> Hotspot> Setup process is ....
A. Hotspot interfaces
D. User Profiles
Answer: D
1.When viewing the routes in Winbox, some routes will show "DAC" in the first column. These
flagsmean:
2. During a scan, in order to see all the available wireless frequencies that are supported by the
card , thefollowing option must be selected in the wireless card's "Frequency Mode":
A. superchannel
B. regulatory domain
C. manual txpower
Jawaban : A
Penjelasan : untuk melihat semua frekuensi yang support pada NIC, gunakan mide Superchanel
realized that he has a static route on the routers. What can be done to make the staticroute work
A. Delete all static routes because there is no way for it to work with OSPF
C. He should manually disable the static routes and enable them whenever OSPF fails
Penjelasan : untuk membuat failover atau jalur cadangan seperti kasus diatas bisa
denganmemberikan angka distance yang lebih besar pada static routingnya karena router
4. RouterOS device has acquired an IP address from an ISP using DHCP client. The samerouter
is used for assigning IP addresses to local users using DHCP server, masquerade
ruleisconfigured properly. Packets that are coming from the ISP have TTL=1. Select correct
A. Router does not have access to the Internet, but clients have
Penjelasan : sesuai namanya TTL (TIME TO LIVE ) merupakan header yang menunjukanberapa
lama paket itu bisa bertahan, untuk setiap kali mampir di sebuah roter nilainya akan
berkurang satu, jadi apabila habis ia tidak bisa terkirim ke tujuan selanjutnya, jadi klo TTLnya 1
A. 8
B. 16
C. 1
D. 256
6. Consider the wireless access point with mode = ap-bridge. What is the maximum number of
A. 2012
B. 2048
C. 1024
D. 2007
8. When traffic reaches the end 'chain = custom'. What will happen next?
A. PPtP clients
B. Router users
C. L2TP clients
D. PPPoE clients
E. IPSec clients
F. PPP clients
10. For static routing functionality, additional to the RouterOS 'system' package, you also need
A. advanced-tools
C. dhcp
D. routing
A. Reinstall software without losing license (Reinstall software without losing license)
12. What is the correct action for NAT rules on routers that have to intercept SMTP traffic and
A. Passthrough
B. tarpit
C. redirect
D. ff-nat
13. Where should you upload the new MikroTik RouterOS package package to upgrade the
router?
14. There is more than one PPPoE server in one broadcast domain:
False
15. What type of encryption can be used to make a connection with a simple access code without
16.When Mikrotik functions as a DHCP Client, the IP address will automatically be inherited
True
False
Answer: True
17.Out interface that is selected when the NAT setting is the ether port it is headed to?
A. IP Wan
B. IP LAN
C. IP Address
D. IP Routes
Answer: A
18.IP Pool 192.168.100.2 - 192.168.100.25 then the IP that can be connected is?
A. 192.168.100.15
B. 192.168.100.26
C. 192.168.100.30
D. 192.168.100.5
Answer: A, D
A. Routing
B. Queues
C. System
D. Logs
Answer: B
A. Infinite time
B. 1 month
C. 1 year
D. 24 hours
Answer : A
(08)EMA TYA M
2. If ARP=reply-only is enabled on one router interface, router can add dynamic ARP entries for
False
True
a. Switch> enable
b. Switch> show
c. Switch> login
4. What configuration is added by /ip hotspot setup command? (select all that apply)
a. /ip service
d. /ip dhcp-server
e. /queue tree
5. Using wireless connect-list it’s possible to prioritize connection to one Access Point over
a.False
b. True
a. 187
b. 168
c. 187,168
d. 11
e. 12
a. TCP 8291
b. TCP 80
c. UDP 8291
d. TCP 8192
8. MikroTik RouterOS is sending logs to an external syslog server. Which protocol and port is
a. UDP 514
b. UDP 21
c. UDP 113
d. TCP 110
9. When adding a static route, you must always ensure that you add both the gateway and the
interface.
False
True
a. Router will drop the packet at ICMP (jump) chain drop rule (5th rule)
c. Router will drop the packet at the Input drop rule (3rd rule)
a. Queue limits host 192.168.1.10 upload data rate to one megabit per second.
b. Queue guarantees download data rate of one megabit per second for host 192.168.1.10
c. Queue guarantees upload data rate of one megabit per second for host 192.168.1.10
d. Queue limits host 192.168.1.10 download data rate to one megabit per second.
b. Install Linux
d. Reinstall RouterOS
a. 1-2049
b. 1-4096
c. 1-4095
d. 1-2048
14. Where can you monitor (see addresses and ports) real-time connections which are processed
by the router?
a. Queue Tree
b. Tool Torch
c. Firewall Counters
d. trunk interface
17. To make the masquerading of the network 192.168.0.0/24, configured on the interface
action=masquerade
action=masquerade
action=masquerade
18. On the advanced menu of the wireless setup there is a parameter called "Area", it works
directly with:
a. None of these
b. Connect List
c. Access List
d. Security Profile
d. Show IP
20. HotSpot is required on the interfaces ether2, ether3, wlan1 (in ap-bridge mode).
a. On ether2 interface
b. On ether3 interface
c. On wlan1 interface
d. On bridge1 interface
1. Action=redirect applies to
A. Route rules
B. DST-NAT rules
D. SRC-NAT rules
Correct Answer: B
a. client address
c. server address
3. Hotspot is required on the interfaces ether2, ehter3, wlan1 (in ap-bridge mode).
A. ether2
B. ether3
C. bridge1
D. wlan1
Correct Answer: C
4. Mark all the configuration where RouterOS is utilizing the DNS feature
B. Hotspot configuration
C. Web-proxy configuration
D. PPP Configuration
Correct Answer: B
5. Which facility should be used, to ensure that clients with radio signal strength poorer than -90
A. Access List
B. Connecttion List
C. Registered List
Correct Answer: A
to-address=192.168.1.2 toports=81
A. Forwards any TCP traffic incoming through ether1 port 81 to the port 3389 of the internal
host 192.168.1.2
B. Forwards all TCP traffic from 192.168.1.2 to port 81 of the interface ether1
C. Forwards any TCP traffic incoming through ether1 port 3389 to the port 81 of the internal
host 192.168.1.2
Correct Answer: C
7. If ARP = reply-only is activated on one router interface, the router can add dynamic ARP
False
True
8. Where is the default port IP-Winbox?
a. TCP 8291
b. TCP 80
c. UDP 8291
d. TCP 8192
d. 192.168.0.0/16
10. Which computer can communicate directly (without the router involved)
11. MikroTik RouterOS sends logs to an external syslog server. Which protocols and ports does
a. UDP 514
b. UDP 21
c. UDP 113
d. TCP 110
12. What configuration is added by the / ip hotspot setup command? (Select all that apply)
a. / ip service
b. / ip hotspot user
c. / ip gardened hotspot
d. / ip dhcp-server
e. / queue tree
13. Using a wireless connection list, it is possible to prioritize connections to one Access Point in
b. Correct
15. Routers A and B both run as PPPoE servers on a broadcast domain that is different from your
network. It is possible to set Router A to use the "/ ppp secret" account from Router B to
a. Incorrect
b. Correct
16. In which order are entries in the Access List and Welcome List processed?
A. In descending order
b. In random order
A.TCP TCP
B. ICMP
C. UDP
D. ARP
18. When solving network problems from within the network, you find that you can ping gates
reliably, but you cannot surf the Internet. Skype, however, works perfectly. What is the most
likely problem?
20. For static routing functionality, in addition to the RouterOS system package, you also need
a. route
b. no
c. dhcp
d. advanced tools
1. RouterOS Mikrotik x86 version is a proxy version that can only be used on devices ...
A.Computer / PC
B.Routerboard
C.Wireless Router
D.Outdoor Wireless
Yes
a. target-address, max-limit ++
c. target-address, dst-address
d. max-limit
computer networks
A.OSI
B.ISO
C.IEEE
D.IETF
7. Two hosts, A and B, are connected to a broadcast LAN. Select all the answers showing pairs
of IP address/mask which would allow IP connections to be established between the two hosts.
A. Telnet
B. Test Server
C. Ping
D. Flood Ping
Answer: D
11. What is the number of packet count limitations on the Mikrotik winbox Flood Ping tool is ...
A. 1500
B. infinity
C. 1000
D. 2000
Answer: A
Jawaban : B
12. In which situations Netinstall can not be used to install RouterOS on a RouterBOARD?
Jawab : C
assigned to the interface. Possible IP pools, that can be used by this DHCP server, are:
A. 192.168.0.1-192.168.0.255
B. 192.169.0.1-192.169.0.254
C. 192.168.0.1-192.168.0.99 , 192.168.0.101-192.168.0.254
D. 192.168.0.1-192.168.0.14
Jawaban : C
static IP address are defined for your servers: 10.1.2.31-10.1.2.33. After a while 20 more IP
addresses need to be distributed in the network. It is possible to distribute the extra IP address
Jawaban : false
Penjelasan : kita harus menambahkan DHCP Server untuk menambahkan ip pool lagi
13. During a scan, in order to see all the available wireless frequencies that are supported by the
card, the following option must be selected in the wireless card's "Frequency Mode":
A. superchannel
B. regulatory domain
C. manual txpower
Jawaban : A
Penjelasan : untuk melihat semua frekuensi yang support pada NIC, gunakan mode Superchannel
14. It is required to make a web server on a private LAN visible on the Public Internet. Only the
web server port should be visible to the public. Which of the following configuration steps must
be met.
B. A route between the NAT Router and the webserver must exist
D. in ip firewall NAT there should be a dst-nat between the public ip of the router and the private
ip of
the webserver
Jawaban : D dan B
A. 1 month
B. 24 hours
C. 1 year
D. Infinite time
Jawaban : B
Penjelasan : lisensi level 1 hanya bisa dipakai selama 1 hari atau 24 jam
16. What is the correct action for a NAT rule on a router that should intercept SMTP traffic and
A. tarpit
B. dst-nat
C. passthrough
D. redirect
Jawaban : D
Penjelasan : router akan mengarahkan packet kea rah yang telah ditentukan oleh admininstrator
Jawaban :true
Penjelasan : karena ketika kita ingin membuat pppoe untuk kclient, client tersebut membutuhkan
18. A DHCP server is configured on a LAN interface which is a port on a bridge. The DHCP
A. The DHCP server can not run on an interface which is also a bridge port
Jawaban : A
Penjelasan : jika interface tersebut sudah di bridge, dhcp server pada interface tersebut tidak akan
19. You want to transfer existing '/ip firewall filter' configuration from one router to a new
A. Export global configuration and remove everything apart from '/ip firewall filter'
Jawaban : B
dst-addr=10.1.1.0/24 gateway=5.5.5.5
dst-addr=10.1.1.4/30 gateway=5.6.6.6
A. both - half of the traffic will be routed through one gateway, half through the other
B. 5.5.5.5
D. 5.6.6.6
Jawaban ; D
FALSE
Penjelasan: Tidak semua Kesalahan dala networking itu berasal dari Ethernet. Semua kesalahan
bisa terjadi mulai dari salah konfigurasi, kesalahan Router maupun kesalahan pada kabel
sehingga jawaban yang tepat adalah False karena tidak semua kesalahan terjadi pada kabel
3. What letters appear next to a route, which is automatically created by RouterOS when user
A. I
B. D
C. A
D. S
E. C
JAWAB : B
a. client’s address
c. server’s address
Jawaban : A
IP Laptop Sendiri
5. Simple Queue number 0 defines 2M for upload and download for target IP 10.10.0.33. Simple
Queue number 1 defines 4M for upload and download for target IP 10.10.0.33. Client
A. 6M upload/download
B. 0M upload/download
C. 4M upload/download
D. 2M upload/download
Jawaban : D
Penjelasan : berapapun jumlah simple queue yang dibuat, yang digunakan adalah yang paling
pertama.
A. neighbors
B. LCD support
C. ip-scan
D. ping
E. netwatch
F. bandwidth-test
Jawaban : C, D, E, F
7. You have a DHCP server on your MikroTik router. The IP addresses 10.1.2.2-10.2.2.20 are
distributed
in the DHCP network. Additionally, 3 static IP address are defined for your servers:
Jawaban : false
Penjelasan : kita harus menambahkan DHCP Server untuk menambahkan ip pool lagi
a. 192.168.0.1
b. 172.168.254.2
c. 172.28.73.21
d. 10.110.50.37
e. 11.63.72.21
Jawaban : B & E
A, C, D adalah IP Private
9. What is the correct action to be specified in the NAT rule to hide a private network when
A. masquerade
B. allow
C. passthrough
D. tarpit
Jawaban : A
A. Associated
B. Not valid
C.Close
D. Established
E.Syn
F.New
11. Not possible to delete the admin user in the proxy table user
A. Correct
B. Incorrect
12. Which choice should you use when you want to prevent access from one specific address to
13. Which is the standard baud rate for RouterBOARDs currently produced?
A.115200
B.8291
C.11520
D.3128
14. Which type of queue is suitable for crowded environments but not good for UDP?
A.PCQ
B.BFIFO
C.PFIFO
D. RED
E.SCQ
15. What parameters must be considered in the scanner menu when we want to connect a proxy
A. SSID
B. Address
C. Signal
D. Channel
Answer: C
16.You need to set up an E1(T1) connection with PPP configured. Which License Level is
needed?
A. Level 4
C. Level 5
Answer : B
17.Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized,
Yes
No
Answer : No
18.To make all DNS request coming from your network to resolve on your router (regardless of
clients configuration), which action would you specify for the DST-NAT rule?
A. Dst-nat
B. Redirect
C. Masquerade
Answer : B
Answer : B
20.Which software version can be installed onto the following RouterBoard types?
A. Routeros-x86-x.xx.npk on a RB1100
B. Routeros-powerpc-x.xx.npk on a RB333
C. Routeros-mipsle-x.xx.npk on a RB133
D. Routeros-mipsbe-x.xx.npk on a RB433
E. Routeros-mipsbe-x.xx.npk on a RB133
Answer : C, D
(27)RIDWAN AJI N
1. If you need to ensure that one computer on your HotSpot network can access the Internet
a. User
b. IP binding
c. Walled-garden
d. IP walled garden
2. How many different priorities can be chosen for queuing on MikroTik RouterOS?
a. 8
b. 16
c. 0
d. 1
3. Check the permitted input formats for the wireless scan list.
a. 5500,5700
b. 5500-5700
c. 5500/5700
d. 5500 - 5700
e. 5500 5700
a. 256
b. 1
c. 16
d. 8
9. Which is IP A Class?
A. 10.20.1.2
B. 10.256.27.1
C. 192.168.27.1
D. 10.27.2.1
A. 192.168.1.1
B. 10.10.1.1
C. 172.27.1.1
D. 128.28.1.2
A. 192.168.27.1
B. 127.27.1.3
C. 192.27.1.1
D. 10.10.1.1
A. 10.0.0.0 – 10.10.255.255
B. 10.10.0.0 – 10.255.255.255
C. 10.0.0.0 – 10.255.255.255
A. 22
B. 23
C. 1
D. 80
A. 192.168.0.0 – 192.168.255.255
B. 128.0.0.0 – 192.168.255.255
C. 17.16.0.0 – 172.31.255.255
D. 10.0.0.0 – 10.255.255.255
A. 10.0.0.0 – 10.255.255.255
B. 172.31.0.0 – 172.32.255.255
C. 192.168.1.0 – 192.168.255.255
D. 192.168.0.0 – 192.168.255.255
A. 32
B. 30
C. 64
D. 62
19. Default IP on winbox
A. 192.168.1.1
B. 0.0.0.0
C. 10.0.0.0
D. 192.168.88.1
2. Which configuration menu should you use to change router's Winbox default port?
B. /ip service
C. /system resource
3. Which firewall chain should be used for filters that protect your router interface?
A. forward
B. prerouting
C. postrouting
D. input
4. Router has wireless and ethernet client interfaces, all client interfaces are bridged. To create a
configured on:
A. Ethernet and wireless interfaces
5. What is the term for the hardware code address found in the interface?
a. IP address
b. Interface Address
c. MAC Address
d. FQDN Address
6. What is the meaning of the status letter "R" on a PPPoE client interface in RouterOS
Interfaces menu?
A. Reconnecting
B. Running
C. Radius
D. Remote
a. DHCP
b. I P
c. TCP
d. ICMP - ping
8. What types of users are listed in the Secret PPP menu window?
a. pptp users
b. l2tp users
c. Winbox users
d. wireless users
e. pppoe users
f. hotspot users
b. 192.168.1.4
c. 172.16.13.23
d. 11.3.10.4
11. The MAC layer with the OSI model is also known as
a. Layer 3
b. Layer 7
c. Layer 2
d. Layer 6
e. Layer 1
12. How many layers does the Open System Interconnection model have?
a. 12
b. 6
c. 9
d. 5
e. 7
a. 3
b. 4
c. 1
d. 21
a. Byte
b. Frame
c. Bit
d. Header
15.If the router can ping a public ip address (example: 8.8.8.8), but cannot ping a domain name
A. DHCP Server
B. DNS Servers
C. Gateway
D. Servers
Answer: B
16.The term is often used to specify the minimum guaranteed speed that can be accepted by
Answer: B
17.The Walled Garden feature is a feature to allow users to access an address without
Answer: A
18.The basic difference between chains in NAT is srcnat and dstnat, features that function to
A. Redirect
B. Srcnat
C. Dstnat
D. Jump
Answer: C
19.A NAT action that works if the LAN has a different prefix than the public IP prefix. For
example, IP LAN has a prefix / 24 and will be NAT to Public IP with a prefix / 27. At the
beginning of the connection, the LAN IP will be randomly changed to Public IP.
A. Tarpit
B. Same
C. Netmap
D. Passtrough
Answer: B
20.by default what is included in the Mikrotik Filter Firewall feature ...
A. Srcnat, etc.
C. Drop, reject
D. Prerouting, postrouting
Answer: B
(19)MUHAMMAD ANJAS A
1. To check the results of installing the RJ 45 connector on the UTP cable we use ...?
A.Creamed pliers
B.Multitester
C.LAN Tester
D.POE
E.Connector
2. To strengthen the signal on the local network cable,we need device ...?
A.Bridge
B.The gateway
C.Repeater
D.Amplifier
E.Router
A.Direct
B.Cabless
C.Wireline
D.Wireless
E.Dekless
5. In network technology known as the OSI model, what does OSI stands for ...?
6. Service on the server that allows clients to send electronic mail locally or via the internet is
called ...?
A.Web Mail
B.Mail Server
C.FTP Server
D.Web Server
E.Mail Client
A.Samba
B.Squid
C.Squirrel
D.Python
E.Apache
A.Apache
B.Squid
C.Nginx
D.Python
E.Samba
A. Hub
B. Modem
C. Repeater
D. Router
E. Bridge
10. Services that can be activated on the server are as follows, except ...?
A.NTFS Server
B.DHCP Server
C.FTP Server
D.DNS server
E.WEB Server
11. OSI Reference Model consists of 7 layers, the 4th layer of the OSI reference is ....?
A.Presentation
B.Session
C.Network
D.Transport
E.Application
12. OSI Reference Model consists of 7 layers, the 1st layer of the OSI reference is ....?
A.Physical
B.Session
C.Internet
D.Network
E.Application
13. TCP Reference Model consists of 4 layers, the 3rd layer of the TCP reference is ....?
A.Physical
B.Session
C.Internet
D.Transport
E.Application
A.WEP
B.WAP
C.WPA
D.SSID
E.MAC Address
A.25 - TCP
B.23 - TCP
C.137 - TCP
D.123 - UDP
E.3128 – TCP
16. In the security of the data network is damaged before reaching the destination called ...?
A.Interruption
B.Interception
C.Modification
D.Fabrication
E.DoS
18. The tool used to determine the frequency that has been used by other WaveLAN networks is
called ...
A. Spectrum Analyzer
B. AVO Meter
C. Multi Meters
D. Syncronize Analyzer
E. Metal Analyzer
20. Mikrotik RouterOS is based GUI operating system,if we want to execute it in CLI which is
A.Queues
B.Switch
C.PPP
D.New Terminal
E.Interfaces