Soal Latihan - Olimpiade Jaringan MikroTik Smk 2017

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Walidtkj
W
Walidtkj
Community Contributor
Quizzes Created: 2 | Total Attempts: 16,969
| Attempts: 16,080
SettingsSettings
Please wait...
  • 1/100 Pertanyaan

    Opsi yang perlu di pilih ketika ingin menonaktifkan sebuah package pada mikrotik dapat dilakukan dengan cara melakukan klik pada tombol ......

    • Disable
    • Downgrade
    • Enable
    • Uninstall
Please wait...


Quiz Preview

  • 2. 

    Cara paling mudah untk mengkonfigurasi sebuah perangkat mikrotik routerboard adalah dengan menggunakan....

    • CLI / Text

    • Winbox

    • Webfig

    • Quick Set

    Correct Answer
    A. Winbox
    Explanation
    The easiest way to configure a Mikrotik routerboard is by using Winbox. Winbox is a graphical user interface (GUI) tool provided by Mikrotik that allows users to configure and manage their routerboards. It provides a user-friendly interface with various options and settings, making it convenient for users to configure their devices without the need for complex command-line configurations.

    Rate this question:

  • 3. 

    Pada menu apakah jika kita ingin melakukan konfigurasi Identity pada router mikrotik ???

    • System > Identitas

    • System > Identity

    • Tool > Identity

    • New Terminal > Identity

    Correct Answer
    A. System > Identity
    Explanation
    To configure the Identity on a MikroTik router, you need to go to the "System > Identity" menu. This menu allows you to set the name of the router, which is used for identification purposes. By accessing this menu, you can easily configure and change the identity of the router according to your requirements.

    Rate this question:

  • 4. 

    Berikut ini, yang tidak termasuk package aplikasi pada mikrotik adalah...

    • System

    • Hotspot

    • Dhcp

    • Mipsbe

    Correct Answer
    A. Mipsbe
    Explanation
    The given options are system, hotspot, dhcp, and mipsbe. Among these options, mipsbe is not a package application on MikroTik. The other options, system, hotspot, and dhcp, are all package applications that are commonly used in MikroTik routers.

    Rate this question:

  • 5. 

    Menginstall mikrotik router OS di PC dapat dilakukan dengan menggunakan cdrom, jenis routeros yang harus digunakan adalah....

    • Routeros-mipsbe

    • Routeros-smips

    • Routeros-ppc

    • Routeros-x86

    Correct Answer
    A. Routeros-x86
    Explanation
    To install MikroTik RouterOS on a PC using a CD-ROM, the appropriate type of RouterOS to be used is "routeros-x86". This version is specifically designed for x86 architecture, which is commonly used in personal computers. The other options mentioned (routeros-mipsbe, routeros-smips, routeros-ppc) are designed for different hardware architectures and are not suitable for installation on a PC.

    Rate this question:

  • 6. 

    Perhatikan kedua baris perintah mikrotik diatas, perbedaan mendasar antara kedua baris tersebut, terletak pada....

    • Baris 1 : restore - baris 2 : backup

    • Baris 1 : backup - baris 2 : restore

    • Baris 1 : backup keseluruhan - baris 2 : backup secara keseluruhan

    • Baris 1 : backup keseluruhan - baris 2 : backup konfigurasi ip address

    Correct Answer
    A. Baris 1 : backup keseluruhan - baris 2 : backup konfigurasi ip address
    Explanation
    The fundamental difference between the two lines is that the first line "backup keseluruhan" refers to a complete backup, which includes all configurations and settings of the MikroTik device. On the other hand, the second line "backup konfigurasi ip address" specifically refers to a backup of only the IP address configurations.

    Rate this question:

  • 7. 

    Menu pada wireless untuk mengkonfigurasi pengamanan / security adalah.....

    • Security Profile

    • SSID

    • Default Authenticate

    • Authenticate

    Correct Answer
    A. Security Profile
    Explanation
    The correct answer is "Security Profile" because in a wireless network, the security profile is used to configure and manage the security settings. It allows the user to set up encryption methods, authentication protocols, and other security measures to protect the network from unauthorized access. The security profile is essential for ensuring the confidentiality, integrity, and availability of the wireless network.

    Rate this question:

  • 8. 

    RouterOS Mikrotik versi x86 adalah versi mikrotik yang hanya dapat digunakan pada perangkat...

    • Komputer / PC

    • Routerboard

    • Router Wireless

    • Wireless Outdoor

    Correct Answer
    A. Komputer / PC
    Explanation
    The correct answer is "Komputer / PC". RouterOS Mikrotik versi x86 is a version of Mikrotik that can only be used on computer or PC devices. It is not compatible with Routerboard, Router Wireless, or Wireless Outdoor devices.

    Rate this question:

  • 9. 

    Pada menu apakah kita melihat informasi ip address dynamic (DHCP Client) yang diterima oleh interface DHCP ???

    • Renew

    • Release

    • Status

    • Copy

    Correct Answer
    A. Status
    Explanation
    The correct answer is "Status." The status menu is where we can see the information about the dynamic IP address received by the DHCP client on the interface.

    Rate this question:

  • 10. 

    Perbedaan mendasar aplikasi remote access Telnet dan SSH adalah terletak pada aspek...........

    • Keamanan

    • Kecepatan

    • Keindahan

    • Kemurahan

    Correct Answer
    A. Keamanan
    Explanation
    The fundamental difference between Telnet and SSH remote access applications lies in their security aspect. Telnet is an insecure protocol that transmits data in plaintext, making it vulnerable to eavesdropping and unauthorized access. On the other hand, SSH (Secure Shell) is a secure protocol that encrypts data during transmission, ensuring confidentiality and integrity. Therefore, the correct answer is "Keamanan" (Security).

    Rate this question:

  • 11. 

    Proses pengaksesan mikrotik ke router berdasarkan pengaturan user dan group, user dan group mikrotik dapat ditentukkan melalui menu...

    • System > User

    • Tool > User

    • Mikrotik > User

    • Terminal > User

    Correct Answer
    A. System > User
    Explanation
    The correct answer is "System > User". In Mikrotik, the process of accessing the router is based on the settings of user and group. These user and group settings can be determined through the System > User menu. This menu allows users to be created, edited, and managed, along with assigning them to specific groups with different levels of access and permissions.

    Rate this question:

  • 12. 

    Fitur mikrotik yang berfungsi untuk melindungi router dari akses yang tidak dikehendaki baik yang berasal dari luar internet maupun dari client (local) adalah....

    • Firewall

    • Routing

    • DHCP

    • NAT

    Correct Answer
    A. Firewall
    Explanation
    The correct answer is "Firewall". A firewall is a feature in MikroTik that helps protect the router from unwanted access, whether it is from the internet or from local clients. It acts as a barrier between the router and potential threats, filtering and controlling the network traffic based on predetermined security rules. By implementing a firewall, the router can prevent unauthorized access attempts and ensure the security of the network.

    Rate this question:

  • 13. 

    Dalam melakukan setting / konfigurasi DNS Server pada mikrotik, opsi apakah yang perlu diaktifkan agar mikrotik menjadi / berperan sebagai Router DNS....

    • Servers

    • Allow Remote Request

    • Cache Size

    • Cache Used

    Correct Answer
    A. Allow Remote Request
    Explanation
    To configure the MikroTik router as a DNS server, the "Allow Remote Request" option needs to be activated. This option allows the router to accept DNS requests from clients outside of its network. By enabling this option, the router can act as a DNS server and respond to DNS queries from devices connected to it. This is essential for the router to function as a DNS server and provide DNS resolution services to clients.

    Rate this question:

  • 14. 

    User dalam mikrotik dikategorikan kedalam beberapa group sesuai hak aksesnya, berikut ini yang tidak termasuk group user tersebut adalah....

    • Read

    • Write

    • Full

    • Root

    Correct Answer
    A. Root
    Explanation
    The given options are Read, Write, Full, and Root. The question is asking which one does not belong to the group of user categories in MikroTik. The correct answer is "Root" because it is not a user category in MikroTik. Root is a term commonly used in Linux systems to refer to the superuser or administrator with full control over the system, but it is not a specific user category in MikroTik's user management system.

    Rate this question:

  • 15. 

    Reset konfigurasi dan aplikasi mikrotik dapat dilakukan dengan 3 cara yaitu (kecuali)

    • Hard Reset

    • Soft Reset

    • Net Install

    • Flashing

    Correct Answer
    A. Flashing
    Explanation
    Flashing is not a method for resetting the configuration and applications on a MikroTik device. Hard reset, soft reset, and net install are the valid methods for resetting the configuration and applications. Flashing refers to the process of updating or reinstalling the firmware on a device, but it does not specifically reset the configuration and applications.

    Rate this question:

  • 16. 

    Konfigurasi action pada NAT yang berfungsi untuk mengkonfigurasi dengan tujuan untuk mengubah ip private menjadi ip public adalah

    • Accept

    • Dst-Nat

    • Masquerade

    • Redirect

    Correct Answer
    A. Masquerade
    Explanation
    The correct answer is Masquerade. Masquerade is an action in NAT configuration that is used to transform private IP addresses into public IP addresses. It allows a device with a private IP address to communicate with devices on the internet using a public IP address. This is commonly used in scenarios where a network has limited public IP addresses and needs to share them among multiple devices with private IP addresses. Masquerade hides the private IP addresses and replaces them with the public IP address, enabling communication with external networks.

    Rate this question:

  • 17. 

    Berapakah jumlah host dari network address berikut....192.168.1.64/27

    • 32

    • 30

    • 31

    • 33

    Correct Answer
    A. 30
    Explanation
    The given network address is 192.168.1.64/27. The "/27" indicates that the first 27 bits of the IP address are the network address and the remaining 5 bits are used for host addresses. In binary, the last 5 bits are 00000. Therefore, there are 2^5 (32) possible combinations for the host addresses. However, the first and last combinations are reserved for the network address and broadcast address respectively, leaving 30 possible host addresses.

    Rate this question:

  • 18. 

    Jika di perhatikan ada perubahan warna pada icon Queue rule. maksud queue rule warna merah adalah...

    • Pemakaian Bandwidth normal

    • Pemakaian bandwidth 0-50%

    • Pemakaian bandwidth 51-75%

    • Pemakaian bandwidth 76-100%

    Correct Answer
    A. Pemakaian bandwidth 76-100%
    Explanation
    The red color of the Queue rule icon indicates that the bandwidth usage is between 76% and 100%.

    Rate this question:

  • 19. 

    Proses backup dan restore, dapat dilakukan melalui storage yang tersimpan pada memori mikrotik, menu ini dapat diakses melalui...

    • File

    • Disk

    • Remote

    • Hardisk

    Correct Answer
    A. File
    Explanation
    The correct answer is "File" because the question is asking about the process of backup and restore, which can be done through the storage stored in the memory of the MikroTik. This suggests that the option "File" is the most appropriate choice as it refers to accessing the menu for backup and restore through files stored in the memory.

    Rate this question:

  • 20. 

    Apakah fungsi dan kegunaan parameter "Use Peer DNS" pada menu DHCP Client berikut....

    • Konfigurasi DNS secara Manual

    • Konfigurasi DNS Master

    • Konfigurasi DNS Otomatis

    • Konfigurasi DNS Slave

    Correct Answer
    A. Konfigurasi DNS Otomatis
    Explanation
    The "Use Peer DNS" parameter in the DHCP Client menu is used for automatic DNS configuration. When this parameter is enabled, the DHCP client will receive DNS server information from the DHCP server, allowing the client to automatically configure its DNS settings. This is useful in scenarios where the network uses dynamic IP addressing and the DNS server IP addresses may change frequently. By enabling this parameter, the client can ensure that it always has the correct DNS server information without the need for manual configuration.

    Rate this question:

  • 21. 

    Jika router bisa ping ke ip address public (contoh : 8.8.8.8), namun tidak bisa ping ke nama domain (DNS), opsi apakah yang harus kita konfigurasi...

    • DNS Servers

    • Servers

    • Gateway

    • DHCP Server

    Correct Answer
    A. DNS Servers
    Explanation
    If the router can ping a public IP address but cannot ping a domain name, the issue is likely with the DNS (Domain Name System) configuration. The DNS servers are responsible for resolving domain names to their corresponding IP addresses. By configuring the DNS servers correctly, the router will be able to resolve domain names and successfully ping them.

    Rate this question:

  • 22. 

    Secara default chain apakah yang termasuk pada fitur Firewall Filter Mikrotik....

    • Input, output, forward

    • Srcnat, dstnat

    • Prerouting, postrouting

    • Drop, reject

    Correct Answer
    A. Input, output, forward
    Explanation
    The correct answer is input, output, forward. These are the default chains included in the Firewall Filter feature of MikroTik. The input chain is used for packets destined for the router itself, the output chain is for packets originating from the router, and the forward chain is for packets passing through the router. These chains allow for filtering and controlling the flow of network traffic.

    Rate this question:

  • 23. 

    Bridge adalah sebuah fitur yang berfungsi untuk menggabungkan interface yang berbeda  kedalam 1 interface logical, Berikut ini yang termasuk kelebihan bridge adalah...

    • Sulit untuk mengatur trafik broadcast (misalnya akibat virus, dll)

    • Permasalahan pada satu segmen akan membuat masalah di semua segmen pada bridge yang sama

    • Peningkatan beban trafik akibat terjadinya akumulasi traffic

    • Menghemat sumber daya dan penggunaan perangkat

    Correct Answer
    A. Menghemat sumber daya dan penggunaan perangkat
    Explanation
    The correct answer is "Menghemat sumber daya dan penggunaan perangkat". This is because a bridge helps to combine different interfaces into one logical interface, which reduces the need for multiple physical devices. This saves resources and reduces the overall usage of devices, leading to cost savings and improved efficiency.

    Rate this question:

  • 24. 

    Model arsitektural jaringan komputer yang dikembangkan sebagai standar komunikasi data dalam jaringan komputer

    • OSI

    • ISO

    • IEEE

    • IETF

    Correct Answer
    A. OSI
    Explanation
    The OSI (Open Systems Interconnection) model is an architectural model for computer networks that was developed as a standard for data communication in computer networks. It is a conceptual framework that defines a set of protocols and standards to enable different computer systems to communicate with each other. The OSI model consists of seven layers, each responsible for a specific aspect of network communication. It provides a standardized approach to network communication, allowing for interoperability between different network devices and systems.

    Rate this question:

  • 25. 

    Untuk mengakses sebuah mikrotik melalui jalur Webfig maka kita membutuhkan aplikasi......

    • Winbox

    • Putty

    • Web Browser

    • Telnet

    Correct Answer
    A. Web Browser
    Explanation
    To access a MikroTik device through Webfig, we need a web browser. Webfig is a web-based configuration interface provided by MikroTik that allows users to configure and manage their MikroTik devices using a graphical user interface (GUI) accessed through a web browser. Therefore, using a web browser is the correct option for accessing a MikroTik device via Webfig.

    Rate this question:

  • 26. 

    Untuk mengakses mikrotik dalam mode teks menggunakan fitur SSH / Telnet, maka kita memerlukan aplikasi client seperti puTTY dan lainnya, hal selanjutnya yang diperlu diketahui sebelum dilakukan proses remote adalah....

    • IP Address

    • MAC Address

    • Network Address

    • Subnetmask

    Correct Answer
    A. IP Address
    Explanation
    Before performing remote access using SSH/Telnet, one important thing to know is the IP Address. The IP Address is a unique identifier assigned to each device on a network. It is necessary to know the IP Address of the MikroTik device in order to establish a connection using a client application like puTTY. The IP Address allows the client application to locate and connect to the specific MikroTik device over the network.

    Rate this question:

  • 27. 

    Status apakah yang ditampilkan pada status DHCP Client, ketika berhasil mendapatkan ip address dynamic.....

    • Bound

    • Success

    • Bounding

    • Start

    Correct Answer
    A. Bound
    Explanation
    The correct answer is "Bound". When a DHCP client successfully obtains a dynamic IP address, the status displayed is "Bound". This means that the client has successfully completed the DHCP lease process and has been assigned an IP address by the DHCP server.

    Rate this question:

  • 28. 

    Berikut ini yang tidak termasuk dalam jenis alamat MAC Address pada jaringan adalah...

    • 02:00:4C:4F:4F:50

    • 91:F5:G8:E7:55:40

    • 74:E5:43:7A:F1:CE

    • 74:E5:43:7A:F1:CE

    Correct Answer
    A. 91:F5:G8:E7:55:40
  • 29. 

    Berikut ini adalah protocol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, TELNET, untuk berkomunikasi adalah...

    • TCP

    • UDP

    • ICMP

    • SNMP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) adalah protokol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, dan TELNET untuk berkomunikasi. TCP adalah protokol yang handal dan terjamin pengiriman datanya. Protokol ini menggunakan pendekatan dengan mengatur aliran data, memastikan bahwa data dikirim dengan urutan yang benar, dan melakukan pemeriksaan kesalahan untuk memastikan keintegritasan data. Dalam konteks ini, TCP adalah protokol yang paling sesuai untuk digunakan oleh aplikasi-aplikasi tersebut.

    Rate this question:

  • 30. 

    Metode yang digunakan untuk menghubungkan banyak komputer ke jaringan internet dengan menggunakan satu atau lebih alamat ip adalah....

    • NAT

    • WEBFIG

    • FILTER RULES

    • LAYER 7 PROTOCOL

    Correct Answer
    A. NAT
    Explanation
    NAT (Network Address Translation) is the method used to connect multiple computers to the internet using one or more IP addresses. It allows the translation of private IP addresses to public IP addresses, enabling multiple devices within a network to share a single public IP address. NAT is commonly used in home or office networks to conserve IP addresses and provide internet access to multiple devices simultaneously. It acts as a mediator between the local network and the internet, ensuring secure and efficient communication between them.

    Rate this question:

  • 31. 

    Kecepatan maksimal transfer data pada standar wireless 802.11g 2.4GHz adalah....

    • 54 Mbps

    • 11 Mbps

    • 300Mbps

    • 100Mbps

    Correct Answer
    A. 54 Mbps
    Explanation
    The maximum data transfer speed for the 802.11g wireless standard operating at 2.4GHz is 54 Mbps. This standard was introduced in 2003 and is capable of providing faster data transfer compared to the previous 802.11b standard. The 2.4GHz frequency band allows for better range but may be more susceptible to interference from other devices operating in the same frequency range.

    Rate this question:

  • 32. 

    Bit-bit yang dikelompok menjadi frame-frame untuk selanjutnya diproses pada layer selanjutnya, proses ini dikenal dengan framming, proses tersebut berjalan pada layer ke...

    • Data Link

    • Physical

    • Network

    • Transport

    Correct Answer
    A. Data Link
    Explanation
    The process of grouping bits into frames for further processing at the next layer is known as framing. This process occurs at the Data Link layer.

    Rate this question:

  • 33. 

    Ketika melakukan reset konfigurasi mikrotik, routerboard akan di reboot, setelah proses reboot, apakah seluruh konfigurasi dan file terhapus ?

    • Ya

    • Tidak

    Correct Answer
    A. Tidak
    Explanation
    Ketika melakukan reset konfigurasi mikrotik, routerboard tidak akan menghapus seluruh konfigurasi dan file. Reset konfigurasi hanya akan mengembalikan pengaturan konfigurasi ke pengaturan awal pabrik, tetapi tidak akan menghapus file atau data yang ada di routerboard.

    Rate this question:

  • 34. 

    Sebuah mikrotik yang dibackup melalui menu File pada winbox, jika tidak diberi nama / identitas maka secara default akan menggunakan nama...

    • Unknown backup

    • Identity

    • Tanggal Backup

    • Identity - Tanggal, dan Waktu

    Correct Answer
    A. Identity - Tanggal, dan Waktu
    Explanation
    When a Mikrotik device is backed up using the File menu in Winbox without specifying a name or identity, it will use the default name format "Identity - Tanggal, dan Waktu" which includes the identity (name) of the device and the date and time of the backup.

    Rate this question:

  • 35. 

    Fitur Walled Garden adalah fitur untuk mengizinkan pengguna untuk mengakses suatu alamat tanpa autentifikasi, action pada walled garden adalah....

    • Allow & deny

    • Accept & drop

    • Drop & reject

    • Bypass & block

    Correct Answer
    A. Allow & deny
    Explanation
    The correct answer is "allow & deny". The Walled Garden feature allows users to access a specific address without authentication. This means that users can enter the address and access its content without having to provide any login credentials. The "allow" action allows the user to access the address, while the "deny" action restricts the user from accessing it.

    Rate this question:

  • 36. 

    Pada dasarnya sebuah router berfungsi untuk menghubungkan network yang memiliki ip address yang berbeda, router beroperasi pada layer ke......

    • Data Link

    • Network

    • Physical

    • Transport

    Correct Answer
    A. Network
    Explanation
    A router functions to connect networks with different IP addresses, allowing them to communicate with each other. This implies that a router operates at the network layer.

    Rate this question:

  • 37. 

    Pembagian sebuah network address, menjadi kelompok-kelompok network yang lebih kecil, hal ini bertujuan untuk membagi dan mengelompokkan host ke kelompok yang lebih spesifik, hal tersebut dikenal dengan istilah...

    • Subnet

    • Host ID

    • Network ID

    • Netmask

    Correct Answer
    A. Subnet
    Explanation
    The given correct answer is "Subnet". When a network address is divided into smaller groups, it is known as subnetting. Subnetting allows for the division and grouping of hosts into more specific subgroups within a network. This helps in efficient management and allocation of IP addresses, as well as improving network performance and security. Subnetting is an essential concept in networking and is commonly used in various network architectures.

    Rate this question:

  • 38. 

    Manajemen bandwidth yang bekerja dengan sebuah algoritma yang akan membagi bandwidth secara merata ke sejumlah client yang aktif, manajemen bandwidth ini dikenal dengan ...

    • PCQ

    • SFQ

    • RED

    • FIFO

    Correct Answer
    A. PCQ
    Explanation
    PCQ stands for Per Connection Queue. It is a bandwidth management algorithm that evenly distributes bandwidth among active clients. PCQ ensures fair allocation of bandwidth by assigning a specific amount of bandwidth to each connection, regardless of the number of clients. This allows for better control and optimization of network resources, ensuring an efficient and equitable distribution of bandwidth for all users.

    Rate this question:

  • 39. 

    Berikut ini, apakah opsi konfigurasi yang tidak terdapat pada menu konfigurasi System > Reset Configuration...

    • Keep User Configuration

    • No Default Configuration

    • Do Not Backup

    • Backup Configuration before Reset

    Correct Answer
    A. Backup Configuration before Reset
    Explanation
    The correct answer is "Backup Configuration before Reset". This option allows users to create a backup of the current configuration settings before performing a reset. This ensures that any important configurations are saved and can be easily restored after the reset. The other options mentioned in the question are all available in the "System > Reset Configuration" menu.

    Rate this question:

  • 40. 

    Paket data yang dikirim oleh client yang memiliki tujuan ke internet, dan melewati router dikenal dengan...

    • Forward

    • Input

    • Output

    • Option 4

    Correct Answer
    A. Forward
    Explanation
    The correct answer is "Forward" because when a client's data packet is sent to the internet and passes through a router, it is forwarded to its destination. The router acts as a bridge between the client and the internet, ensuring that the data reaches its intended recipient.

    Rate this question:

  • 41. 

    Teknik yang digunakan untuk memperluas jaringan dari access point tanpa menggunakan kabel seperti yang biasa dilakukan jaringan dengan kabel, sehingga seluruh perangkat wireless dapat saling terhubung dan berkomunikasi adalah teknik yang dikenal dengan

    • Wireless Distribution System

    • CAPSman

    • AP-Bridge Dynamic

    • WDS Master & Slave

    Correct Answer
    A. Wireless Distribution System
    Explanation
    The correct answer is Wireless Distribution System. This is a technique used to expand a network from an access point without using cables, allowing all wireless devices to connect and communicate with each other.

    Rate this question:

  • 42. 

    Untuk melakukan installasi mikrotik routeros pada routerboard dapat menggunakan aplikasi netinstall, aplikasi lainnya yang dibutuhkan adalah....

    • Routeros

    • Mikrotik

    • Routerboard

    • Kabel lan

    Correct Answer
    A. Routeros
    Explanation
    To perform the installation of MikroTik RouterOS on a RouterBoard, the required application is RouterOS. This is because RouterOS is the operating system developed by MikroTik specifically for their RouterBoard devices. It is necessary to have RouterOS in order to install and run the MikroTik RouterOS software on the RouterBoard.

    Rate this question:

  • 43. 

    Hasil dari proses backup mikrotik yang terenkripsi dan hanya bisa di restore pada mikrotik yang menggunakan model dan tipe yang serupa adalah menggunakan ekstensi...

    • .rsc

    • .bck

    • .npk

    • .backup

    Correct Answer
    A. .backup
    Explanation
    The correct answer is ".backup". When MikroTik backups are encrypted, they can only be restored on MikroTik devices with similar models and types. The backup file extension for these encrypted backups is ".backup".

    Rate this question:

  • 44. 

    Agar sebuah konfigurasi DHCP Client tidak mendapatkan informasi gateway secara otomatis, parameter apakah yang perlu kita konfigurasi...

    • Add Default Route = no

    • Add Default Route = yes

    • Add Default Route = Active

    • Add Gateway Route

    Correct Answer
    A. Add Default Route = no
    Explanation
    If a DHCP client does not automatically receive gateway information, the parameter that needs to be configured is "Add Default Route = no". This means that the client will not add a default route to its routing table automatically.

    Rate this question:

  • 45. 

    Jika client tidak bisa terhubung dengan mikrotik pada port 2 yang dikonfigurasi DHCP Server, opsi apakah yang harus kita cek terlebih dahulu...

    • Cek apakah DHCP Server Running

    • Cek Konektifitas dengan Mikrotik

    • Cek Konfigurasi Firewall

    • Cek Konfigurasi IP Address DHCP pada client

    Correct Answer
    A. Cek Konfigurasi IP Address DHCP pada client
    Explanation
    The correct answer is to check the configuration of the IP address DHCP on the client. This is because if the client is unable to connect to the Mikrotik on port 2, it could be due to an issue with the IP address configuration on the client side. By checking the DHCP configuration on the client, we can ensure that the client is receiving the correct IP address from the DHCP server and that there are no conflicts or misconfigurations causing the connectivity issue.

    Rate this question:

  • 46. 

    Layer OSI yang bertugas untuk membentuk koneksi, kemudian memutuskannya ketika seluruh data telah terkirim atau diterima adalah...

    • Layer 5 Session

    • Layer 4 Transport

    • Layer 3 Network

    • Layer 6 Presentation

    Correct Answer
    A. Layer 5 Session
    Explanation
    Layer 5 Session is responsible for establishing and terminating connections between two devices. It manages the session between the sender and receiver by initiating, coordinating, and terminating the communication. This layer ensures that all the data has been successfully transmitted and received before terminating the session. It also handles synchronization, checkpointing, and recovery of the session in case of any interruptions or errors during the transmission.

    Rate this question:

  • 47. 

    Sebuah header paket data yang diberikan untuk selanjutnya dilakukan proses framming ke layer selanjutnya untuk di transmisikan melalui media transmisi kabel, header paket data tersebut berisi beberapa informasi diantaranya...

    • Protocol & Port

    • Network dan Subnetmask

    • Source Address & Destination Address

    • Network ID dan Host ID

    Correct Answer
    A. Source Address & Destination Address
    Explanation
    The correct answer is "Source Address & Destination Address". The header packet contains information about the source address, which is the address of the sender, and the destination address, which is the address of the receiver. These addresses are used to ensure that the packet is delivered to the correct destination.

    Rate this question:

  • 48. 

    Sebelum melakukan proses netinstall pada mikrotik, konfigurasi apakah yang perlu kita lakukan ???

    • Melakukan Hard Reset

    • Melakukan Soft Reset

    • Melakukan konfigurasi Netbooting

    • Mendownload aplikasi mikrotik_xxxxx.npk

    Correct Answer
    A. Melakukan konfigurasi Netbooting
    Explanation
    Before performing a netinstall process on Mikrotik, the necessary configuration to be done is configuring Netbooting. This involves setting up the network boot server and configuring the necessary settings on the Mikrotik device to enable it to boot from the network. Netbooting allows the Mikrotik device to load the necessary files and software needed for the netinstall process from a network server instead of using local storage.

    Rate this question:

  • 49. 

    Jika kita ingin membuat sebuah user pada mikrotik yang hanya bisa diakses melalui ip address tertentu, opsi apakah yang harus kita konfigurasi ???

    • Allow Address

    • Allowed Address

    • Group Address

    • Name Address

    Correct Answer
    A. Allowed Address
    Explanation
    The correct answer is "Allowed Address." When creating a user on Mikrotik, if we want to restrict access to only a specific IP address, we need to configure the "Allowed Address" option. This allows us to specify the IP address that the user is allowed to access the Mikrotik device from. By configuring this option, we can ensure that the user can only connect to the device from the specified IP address and restrict access from other IP addresses.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 25, 2017
    Quiz Created by
    Walidtkj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.