Router And Servers: MikroTik Certified Network Associate Exam! Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vanyka007
V
Vanyka007
Community Contributor
Quizzes Created: 1 | Total Attempts: 5,984
| Attempts: 5,984 | Questions: 69
Please wait...
Question 1 / 69
0 %
0/100
Score 0/100
1. What protocol does ping use?

Explanation

Ping uses the ICMP (Internet Control Message Protocol) protocol. ICMP is a network protocol used to send diagnostic messages and error reports between network devices. Ping uses ICMP echo requests and echo replies to measure the round-trip time and packet loss between two devices on a network. ICMP is a connectionless protocol that operates at the network layer of the OSI model, making it suitable for troubleshooting network connectivity and determining if a host is reachable.

Submit
Please wait...
About This Quiz
Router And Servers: MikroTik Certified Network Associate Exam! Trivia Quiz - Quiz

The MikroTik Certified Network Associate (MTCNA) course was prepared to make students familiar with Router OS software and Router Board products and if you are preparing to take... see morethe exam, the quiz below is what you need to review all that you have understood in your classes. How about you take this special quiz and get to refresh your memory? see less

2. How many layers does Open Systems Interconnection model have?

Explanation

The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it. These layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Therefore, the correct answer is 7.

Submit
3. The basic unit of a physical network (OSI Layer 1) is the:

Explanation

The basic unit of a physical network at the OSI Layer 1 is a bit. A bit is the smallest unit of data in a computer and can have a value of either 0 or 1. At the physical layer, data is transmitted in the form of electrical or optical signals, which are represented as bits. These bits are then grouped together to form bytes, frames, and headers at higher layers of the OSI model. However, at the physical layer, the individual units of data being transmitted are bits.

Submit
4. What is term for the hardware coded address found on an interface?

Explanation

A MAC address, also known as a Media Access Control address, is a hardware coded address found on an interface. It is a unique identifier assigned to network interfaces for communications on the physical network. MAC addresses are used to ensure that data is sent to the correct device within a network. Unlike IP addresses that can change, MAC addresses are permanent and cannot be modified. Therefore, the correct answer for the term of the hardware coded address found on an interface is MAC Address.

Submit
5. MikroTik RouterOS commands can be run once a day by:

Explanation

The correct answer is /system scheduler. MikroTik RouterOS commands can be scheduled to run at specific times using the /system scheduler command. This allows users to automate tasks and execute commands at regular intervals, such as once a day. The scheduler can be configured to run commands at a specific time, on specific days of the week, or even periodically with a defined interval. This feature provides flexibility and convenience for managing and automating tasks on the MikroTik router.

Submit
6. Select valid MAC-address

Explanation

The given MAC address, 00:00:5E:80:EE:B0, is a valid MAC address. MAC addresses are unique identifiers assigned to network interfaces, and they consist of six pairs of hexadecimal digits separated by colons. The given MAC address follows this format and does not contain any invalid characters or incorrect formatting. Therefore, it is a valid MAC address.

Submit
7. What is possible with Netinstall?

Explanation

Netinstall is a tool provided by MikroTik that allows users to reinstall the RouterOS operating system on their MikroTik devices. This can be useful in situations where the RouterOS has become corrupted or is not functioning properly. By using Netinstall, users can easily restore their devices to a working state by reinstalling the RouterOS.

Submit
8. Which default route will be active? /iproute add disabled=no distance=10 dst-address=0.0.0.0/0 gateway1.1.1.1 add disabled=no distance=5 dst-address=0.0.0.0/0 gateway2.2.2.2

Explanation

The default route that will be active is the one with a lower distance, which in this case is the route via gateway 2.2.2.2. The distance parameter determines the priority of the route, with a lower value indicating a higher priority. Since the distance of the route via gateway 2.2.2.2 is 5 and the distance of the route via gateway 1.1.1.1 is 10, the route via gateway 2.2.2.2 will be active.

Submit
9. MAC layer by OSI model is also known as

Explanation

The correct answer is Layer 2. The MAC layer, also known as the Media Access Control layer, is responsible for controlling access to the physical medium and handling the transmission of data frames. It is located at Layer 2 of the OSI model.

Submit
10. How many IP addresses can one find in the header of an IP packet?

Explanation

In the header of an IP packet, there are two IP addresses. The first IP address is the source IP address, which identifies the sender of the packet. The second IP address is the destination IP address, which identifies the intended recipient of the packet. These IP addresses are crucial for routing the packet across the network and ensuring it reaches the correct destination.

Submit
11. Collisions are possible in full-duplex Ethernet networks.

Explanation

Collisions are not possible in full-duplex Ethernet networks. In full-duplex mode, data can be transmitted and received simultaneously, eliminating the possibility of collisions. Each device has its own dedicated transmit and receive channels, allowing for full-duplex communication without any collisions.

Submit
12. The network address is

Explanation

The network address refers to the first address of the subnet. It is the address that represents the network itself and is used for routing purposes. The first usable address of the subnet would be the second address, as the first address is reserved for the network address. The last address of the subnet is typically used as the broadcast address, so it is not considered the network address.

Submit
13. For static routing functionality, additionally to the RouterOS 'system' package, you will also need the following software package:

Explanation

The correct answer is "no extra package required". This means that for static routing functionality, you do not need any additional software package apart from the RouterOS 'system' package. This implies that the necessary routing functionality is already included in the 'system' package itself, and there is no need to install any other package for static routing.

Submit
14. Is ARP used in the IPv6 protocol?

Explanation

ARP (Address Resolution Protocol) is not used in the IPv6 protocol. Instead, IPv6 uses a different protocol called NDP (Neighbor Discovery Protocol) to perform address resolution and find the link-layer addresses of neighboring devices. NDP serves similar functions to ARP in IPv4, but it has additional features and improvements to support the larger address space and enhanced functionality of IPv6. Therefore, the correct answer is False.

Submit
15. How many usable IP addresses are there in a 20-bit subnet?

Explanation

A 20-bit subnet allows for 2^20 total addresses. However, 2 addresses are reserved for network and broadcast addresses, leaving 2^20 - 2 = 4094 usable IP addresses.

Submit
16. Simple Queue number 0 defines 2M for upload and download for the target IP 10.10.0.33. Simple Queue number 1 defines 4M for upload and download for the target IP 10.10.0.33. Client 10.10.0.33 is been able to obtain

Explanation

The client with IP address 10.10.0.33 is able to obtain 2M upload/download because Simple Queue number 0 defines 2M for upload and download for that target IP.

Submit
17. Router A and B are both running as PPPoE servers on different broadcast domains of your network Are it possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers?

Explanation

It is not possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers. Each router running as a PPPoE server operates on its own broadcast domain and manages its own set of accounts for authentication. The "/PPP secret" accounts are specific to Router B and cannot be accessed or used by Router A for authentication purposes. Therefore, the correct answer is False.

Submit
18. It is possible to use WPA and WPA2 authentication type at the same time with one security profile.

Explanation

It is possible to use both WPA and WPA2 authentication types simultaneously within a single security profile. This allows for increased flexibility and compatibility with different devices and network configurations. By supporting both authentication types, the network can accommodate devices that only support WPA or WPA2, ensuring that all devices can connect securely. This capability enhances the overall security and accessibility of the network.

Submit
19. Is it possible to limit how many clients are able to connect to an access point?

Explanation

Yes, it is possible to limit how many clients are able to connect to an access point using access-lists. Access-lists allow network administrators to control and filter network traffic based on specific criteria, such as the number of clients allowed to connect. By configuring access-lists on the access point, the administrator can set a limit on the maximum number of clients that can connect to the access point simultaneously.

Submit
20. Which of the following is NOT a valid MAC Address?

Explanation

not-available-via-ai

Submit
21. Router A and B are both running as PPPoE servers on different broadcast domains of your network Is it possible to set Router A to use "ppp secret" accounts from Router B to authenticate PPPoE customers?

Explanation

It is not possible to set Router A to use "ppp secret" accounts from Router B to authenticate PPPoE customers because each router operates on its own broadcast domain, meaning they cannot share authentication information. Each router must have its own set of "ppp secret" accounts to authenticate PPPoE customers within its own broadcast domain. Therefore, the answer is false.

Submit
22. You have a router with configuration - Public IP :202.168.125.45/24 - Default gateway:202.168.125.1 - DNS server: 248.115.148.136, 248.115.148.137 - Local IP: 192.168.2.1/24 Mark the correct configuration on client PC to access to the Internet

Explanation

The correct configuration on the client PC to access the internet is IP:192.168.2.115/24 gateway: 192.168.2.1. This is because the client PC should have an IP address within the same subnet as the router's local IP address, which is 192.168.2.1/24. The gateway should also be set to the router's local IP address, which is 192.168.2.1, in order to access the internet through the router.

Submit
23. How long is the level 1 (demo) license valid?

Explanation

The level 1 (demo) license is valid for an infinite amount of time. This means that there is no expiration date or time limit for using the level 1 license. Users can continue to access and utilize the benefits of the license for as long as they need or want to.

Submit
24. Choose all valid hosts address range for subnet 15.242.55.62/27

Explanation

The given subnet is 15.242.55.62/27, which means that it has a subnet mask of 27 bits. This leaves 5 bits for the host portion of the IP address. The valid hosts address range for this subnet would be from the network address + 1 to the broadcast address - 1.

The network address can be obtained by setting all the host bits to 0, which gives us 15.242.55.32. The broadcast address can be obtained by setting all the host bits to 1, which gives us 15.242.55.63. Therefore, the valid hosts address range for this subnet is 15.242.55.33-15.242.55.62.

Submit
25. Is it possible to have PPTP Client and PPTP server on one MikroTik router at the same time?

Explanation

Yes, it is possible to have both a PPTP client and a PPTP server on one MikroTik router at the same time. This allows the router to establish a PPTP connection with another network as a client, while also accepting incoming PPTP connections from other clients as a server. This feature is useful in scenarios where the router needs to connect to a remote network using PPTP, while also allowing other devices to connect to the router securely using PPTP.

Submit
26. Firewall NAT rules process only the first packet of each connection.

Explanation

Firewall NAT rules do not only process the first packet of each connection. Instead, they process all packets of a connection based on the defined NAT rules. These rules are responsible for translating the source and/or destination IP addresses and ports of network packets, allowing for proper routing and communication between different networks. Therefore, the correct answer is FALSE.

Submit
27. A network-ready device is directly connected to a MikroTik RouterBOARD 750 with a correct U.T.P. RJ45 functioning cable. The device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of 255.255.255.252. What will be a valid IPv4 address for the RouterBOARD 750 for a successful connection to the device?

Explanation

The given device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of 255.255.255.252. This means that the device is using a /30 subnet, which allows for only 2 usable IP addresses. The valid IP addresses in this subnet range are 192.168.100.68 and 192.168.100.69. Since the device is already using 192.168.100.70, the valid IP address for the RouterBOARD 750 to successfully connect to the device would be 192.168.100.69.

Submit
28. A HotSpot is required on the interfaces ether2, ether3, wlan1 (in ap-bridge mode).  These interfaces are bridged in the bridge1 interface.  Which interface should the HotSpot server be configured on?

Explanation

The HotSpot server should be configured on the bridge1 interface because the interfaces ether2, ether3, and wlan1 are bridged in the bridge1 interface. Configuring the HotSpot server on the bridge1 interface allows it to apply the necessary settings and rules to all the interfaces that are part of the bridge, ensuring that the HotSpot functionality is applied to all connected devices across those interfaces.

Submit
29. MikroTik RouterOS DHCP client can receive following options:

Explanation

The MikroTik RouterOS DHCP client can receive the IP Gateway, IP Address, and Subnet options. The IP Gateway option specifies the default gateway for the client's network, allowing it to connect to other networks. The IP Address and Subnet options provide the client with its own IP address and the subnet mask to determine its network range. These options are essential for proper network connectivity and communication.

Submit
30. How many usable IP addresses are there in a 23-bit (255.255.254.0) subnet?

Explanation

A 23-bit subnet mask (255.255.254.0) allows for a total of 9 bits to be used for host addresses. Since each bit can be either 0 or 1, this results in 2^9 possible combinations. However, the first and last combinations are reserved for network and broadcast addresses, leaving 2^9 - 2 = 510 usable IP addresses.

Submit
31. Is it possible for a client to get an IP address but no gateway after a successful DHCP request?

Explanation

It is not possible for a client to get an IP address but no gateway after a successful DHCP request. The gateway is an essential component of a network and is responsible for routing traffic between different networks. Without a gateway, the client would not be able to communicate with devices outside of its own network. Therefore, a DHCP server should always provide both an IP address and a gateway to clients during the DHCP request process.

Submit
32. Which of the following protocols / ports are used for SNMP. (Simple Network Management Protocol)

Explanation

SNMP (Simple Network Management Protocol) primarily uses UDP (User Datagram Protocol) for communication. UDP port 161 is used for SNMP requests and port 162 is used for SNMP traps. TCP (Transmission Control Protocol) is not commonly used for SNMP, and none of the other ports listed are associated with SNMP.

Submit
33. What is necessary for PPPoE client configuration?

Explanation

The necessary requirement for PPPoE client configuration is the interface on which the PPPoE client is going to work. This is because the interface is the connection point between the client and the PPPoE server, allowing the client to establish and maintain the PPPoE connection. Without specifying the interface, the client would not be able to connect to the PPPoE server and establish the required connection.

Submit
34. Which of the following Routes statuses are possible?

Explanation

The possible route statuses are Static, Connected, and Active. Static routes are manually configured by the network administrator and do not change unless manually updated. Connected routes are automatically created by the router when it detects a directly connected network. Active routes are those that are currently being used for forwarding packets. The Drop status is not mentioned in the answer, so it is not a possible route status.

Submit
35. You have 802.11 b/g wireless card What frequencies are available to you?

Explanation

The frequencies available to a 802.11 b/g wireless card are 2412MHz and 2422MHz. These frequencies fall within the 2.4GHz range, which is commonly used for Wi-Fi communication. The other frequencies listed (5800MHz, 5210MHz, and 2327MHz) are not within the supported range for this type of wireless card.

Submit
36. Connection state in MikroTik RouterOS is the same thing as TCP state elsewhere?

Explanation

The connection state in MikroTik RouterOS is not the same thing as TCP state elsewhere. MikroTik RouterOS uses its own connection tracking system, which is different from the TCP state used in other systems. While TCP state refers to the specific state of a TCP connection (such as SYN_SENT, ESTABLISHED, etc.), the connection state in MikroTik RouterOS encompasses various protocols and can include states like established, invalid, new, and related. Therefore, the given answer "False" is correct.

Submit
37. Which of the following IP addresses are publicly routable?

Explanation

The IP address 11.3.10.4 is publicly routable because it falls within the range of public IP addresses. The other three IP addresses (127.34.155.3, 172.16.13.23, and 192.168.1.4) are not publicly routable because they are reserved for private networks and cannot be directly accessed over the internet.

Submit
38. You want to use PCQ and allow 256k maximum download and upload for each client. Choose correct argument values for the required queue.

Explanation

The correct answer is "kind=pcq pcq-rate=256000 pcq-classifier=dst-address,kind=pcq pcq-rate=256000 pcq-classifier=src-address". This is because the question states that the desired maximum download and upload for each client is 256k. Therefore, the pcq-rate should be set to 256000. Additionally, the question does not specify whether the classifier should be based on the destination address or the source address, so both options are valid.

Submit
39. Action=redirect is applied in:

Explanation

The action=redirect is applied in the chain=dstnat. This means that when the packet matches the rules in the destination NAT chain, it will be redirected to a different destination IP address or port. This is commonly used for port forwarding or load balancing purposes, where incoming traffic is redirected to a different internal server or port.

Submit
40. Using wireless connect-list it's possible to prioritize connection to one Access Point over another Access Point by changing the order of the entries.

Explanation

The given statement is true. Wireless connect-list allows users to prioritize their connection to one Access Point over another by changing the order of the entries. This means that users can specify which Access Point they want to connect to first, ensuring a higher level of preference for that particular Access Point. This feature is useful in situations where multiple Access Points are available, but the user wants to prioritize their connection to a specific one.

Submit
41. Mark correct statements.

Explanation

Backup files are not editable because they are created as a precautionary measure to safeguard data and restore it in case of any loss or corruption. These files are typically created in a format that cannot be easily modified or edited to prevent accidental changes or tampering with the backup data. Therefore, the statement that backup files are not editable is correct.

Submit
42. You need to reboot a RouterBoard after importing a previously exported RSC file to activate the new configuration.

Explanation



False. After importing a previously exported .rsc (RouterOS script) file on a RouterBoard (MikroTik hardware), the new configuration is typically applied immediately or after running the script, depending on the specific commands in the script. A reboot is not always necessary to activate the new configuration. However, some specific changes might require a reboot to fully take effect, but this is not a general rule for all configurations.
Submit
43. /ip route configuration on router,                    /ip route add dst-address=0.0.0.0/0 gateway=192.168.0.1 /ip route add dst-address=192.168.1.0/24 gateway=192.168.0.2 /ip route add dst-address=192.168.2.0/24 gateway=192.168.0.3 /ip route add dst-address=192.168.3.0/26 gateway=192.168.0.4 Router needs to send packets to 192.168.3.240. Which gateway will be used?

Explanation

Route 1: dst-address=0.0.0.0/0 with gateway=192.168.0.1 (this is a default route)

Route 2: dst-address=192.168.1.0/24 with gateway=192.168.0.2

Route 3: dst-address=192.168.2.0/24 with gateway=192.168.0.3

Route 4: dst-address=192.168.3.0/26 with gateway=192.168.0.4

The destination IP 192.168.3.240 needs to be checked against each route:

192.168.3.240 does not match 0.0.0.0/0 (default route) specifically, but it is the least specific route.

192.168.3.240 does not fall within 192.168.1.0/24 or 192.168.2.0/24.

Route 4 (192.168.3.0/26) covers the IP range 192.168.3.0 to 192.168.3.63, which does not include 192.168.3.240.

Since none of the specific routes cover 192.168.3.240, the router will fall back to the default route.

Therefore, the gateway 192.168.0.1 will be used.

Submit
44. PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there is a router between server and end-user host, it will not be able to create PPPoE tunnel to that PPPoE server.

Explanation

The statement is false because a PPPoE server can work across multiple Ethernet broadcast domains as long as there is a router connecting those domains. The router will forward the PPPoE packets between the server and the end-user host, allowing the creation of a PPPoE tunnel.

Submit
45. The highest queue priority is

Explanation

The correct answer is 1 because in a queue, the priority is usually determined by a numerical value, with lower numbers indicating higher priority. In this case, 1 has the lowest value among the given options, indicating the highest priority in the queue.

Submit
46. If ARP=reply-only is enabled on one router interface, the router can add dynamic ARP entries for the particular interface. 

Explanation

If ARP=reply-only is enabled on one router interface, the router cannot add dynamic ARP entries for that interface. The reply-only mode only allows the router to respond to ARP requests from other devices, but it does not allow the router to initiate ARP requests or add dynamic ARP entries. Therefore, the statement is false.

Submit
47. When backing up your router by using the Export command, the following happens:

Explanation

When backing up your router using the Export command, you have the option to edit the Export file with a standard text editor after it is created. This allows you to make any necessary changes or modifications to the file before saving it. Additionally, during the backup process, you are prompted to provide a name for the export file, which helps in organizing and identifying the backup files.

Submit
48. Wireless clients (mode=station) will work properly if bridged to the ethernet.

Explanation

Wireless clients (mode=station) will not work properly if bridged to the ethernet. This is because when a wireless client is bridged to the ethernet, it essentially becomes a part of the wired network and loses its ability to connect to the wireless network. As a result, it will not be able to communicate with other wireless devices or access the internet wirelessly. Therefore, the statement is false.

Submit
49. To use masquerade, you need to specify

Explanation

The correct answer is "action=masquerade, out-interface, chain=src-nat" because when using masquerade, the action needs to be set as "masquerade" to modify the source IP address of outgoing packets. The "out-interface" parameter specifies the interface that the packets will be going out through, and the "chain=src-nat" parameter indicates that the masquerade action should be applied in the source NAT chain.

Submit
50. Action redirect allows you to make

Explanation

The correct answer is Transparent DNS Cache and Transparent HTTP Proxy. These actions allow you to create a transparent DNS cache, which helps in caching DNS responses for faster access, and a transparent HTTP proxy, which intercepts and handles HTTP requests on behalf of clients without their knowledge. These features are commonly used in network configurations to improve performance and security.

Submit
51. PPP Secrets are used for

Explanation

PPP Secrets are used for authenticating and authorizing various types of clients in a network. L2TP clients, PPP clients, PPtP clients, and PPPoE clients all require PPP Secrets for establishing a secure connection with the network. These secrets ensure that only authorized clients can access the network resources and prevent unauthorized access. Router users, on the other hand, typically use different authentication methods such as username and password or SSH keys, and do not rely on PPP Secrets for authentication.

Submit
52. You have to connect to a RouterBOARD without any previous configuration. Select all possibilities to connect and do some basic configuration

Explanation

To connect to a RouterBOARD without any previous configuration, there are three possibilities: Serial Connection, MAC-Winbox, and Telnet. A serial connection involves connecting a computer to the RouterBOARD using a serial cable, allowing for direct communication and configuration. MAC-Winbox refers to using the MAC address of the RouterBOARD to connect and configure it using the Winbox software. Telnet is another option where the RouterBOARD can be accessed and configured remotely using the Telnet protocol. These three methods provide different ways to connect and perform basic configuration on the RouterBOARD.

Submit
53. If ARP=reply-only is configured on an interface, what will this interface do?

Explanation

When ARP=reply-only is configured on an interface, the interface will accept all IP/MAC combinations listed in the /ip arp list as static entries. This means that any IP address and MAC address combination listed in the ARP table will be considered as valid and static, and the interface will not send ARP requests for these entries. This can be useful in scenarios where specific IP/MAC combinations need to be treated as static and not be subject to ARP requests.

Submit
54. What is possible with Netinstall?

Explanation

Netinstall is a tool provided by MikroTik that allows users to install or reinstall the MikroTik RouterOS operating system. It also provides the functionality to reset the configuration of the RouterOS and reset the password while saving the router's configuration. Therefore, with Netinstall, users can perform tasks such as installing or reinstalling RouterOS, resetting the configuration, and resetting the password with configuration preservation.

Submit
55. Netinstall can be used to

Explanation

Netinstall can be used to install different software versions, allowing for upgrades or downgrades. It can also be used to reinstall software without losing the license. This means that if there is a need to change the software version or if there is a need to reinstall the software, Netinstall can be used to accomplish this without the risk of losing the license.

Submit
56. We have two radio cards in a point-to-point link with settings: Card Nr 1.: mode=ap-bridge ssid="office" frequency=2447 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa Card Nr 2.: mode=station ssid="office" frequency=2412 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa2 Is Card Nr2. able to connect to Card Nr 1.?

Explanation

Card Nr 2 is not able to connect to Card Nr 1 because they are operating on different frequencies. The frequency of Card Nr 1 is 2447, while the frequency of Card Nr 2 is 2412. In order for two devices to connect in a point-to-point link, they need to be operating on the same frequency.

Submit
57. Which is correct masquerade rule for 192.168.0.0/24 network on the router with outgoing interface=ether1?

Explanation

The correct masquerade rule for the 192.168.0.0/24 network on the router with outgoing interface=ether1 is "/ip firewall nat add action=masquerade chain=srcnat out-interface=ether1". This rule specifies that any traffic originating from the 192.168.0.0/24 network and going out through the ether1 interface should be masqueraded, meaning the source IP address will be replaced with the router's IP address. This allows the devices on the 192.168.0.0/24 network to communicate with devices outside their network using the router's IP address.

Submit
58. In MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved by using an address

Explanation

In MikroTik RouterOS, a /30 subnet mask is used for Layer-3 communication between 2 hosts. A /30 subnet mask provides 2 usable IP addresses, allowing for communication between the two hosts. A /31 subnet mask is not commonly used as it only provides 1 usable IP address. A /32 subnet mask is used for loopback addresses and a /29 subnet mask provides 6 usable IP addresses, which is more than what is required for communication between 2 hosts.

Submit
59. Mark all features that are compatible with Nstreme

Explanation

The feature that is compatible with Nstreme is "WDS between a device in ap-bridge mode with a device in station-wds mode". Nstreme is a proprietary wireless protocol developed by MikroTik that is used for point-to-point and point-to-multipoint wireless communication. It allows for high-speed data transmission and low latency. In this case, the WDS (Wireless Distribution System) feature allows for bridging between an access point (ap-bridge mode) and a client device (station-wds mode) using Nstreme protocol. This enables seamless wireless connectivity and communication between the two devices.

Submit
60. Which computers would be able to communicate directly (without any routers involved)

Explanation

not-available-via-ai

Submit
61. A PC with IP 192.168.1.2 can access internet, and static ARP has been set for that IP address on gateway. When the PC Ethernet card failed, the user change it with a new card and set the same IP for it. A PC with IP 192.168.1.2 can access internet, and static ARP has been set for that IP address on gateway. When the PC Ethernet card failed, the user change it with a new card and set the same IP for it.

Explanation

When the PC's Ethernet card is changed with a new one and the same IP address is set, the old static ARP entry on the gateway needs to be updated for the new card. This is because the ARP table on the gateway associates IP addresses with MAC addresses, and since the MAC address of the new card is different from the old one, the gateway needs to be informed of this change. Additionally, the MAC address of the new card needs to be changed to the MAC address of the old card in order to maintain the same network configuration and ensure proper communication with the gateway.

Submit
62. Mark possible TCP states in the connection tracking table.

Explanation

The given answer correctly identifies the possible TCP states in the connection tracking table. "New" represents a new connection that has been initiated, "Related" indicates a connection that is related to an existing connection, "Invalid" signifies an invalid or unauthorized connection, and "Established" represents a connection that is currently active and established. "Closed" is not included in the answer as it represents a state where the connection has been terminated.

Submit
63. Which ones of the following are valid IP addresses?

Explanation

The first IP address, 192.168.13.255, is valid because it falls within the range of 0.0.0.0 to 255.255.255.255, which is the valid range for IP addresses. The second IP address, 192.168.256.1, is not valid because the octet "256" is outside the range of 0 to 255. The third IP address, 10.10.14.0, is valid because all the octets fall within the valid range. The fourth IP address, 1.27.14.254, is also valid because all the octets fall within the valid range.

Submit
64. What is the default TTL (time to live) on a router that an IP packet can experience before it will be discarded?

Explanation

The default TTL (time to live) on a router that an IP packet can experience before it will be discarded is typically 64. This value represents the maximum number of hops or routers that the packet can pass through before it is considered expired and discarded. A TTL value of 60 or 30 is less common and may be used in certain network configurations or for specific purposes, but the default value is generally 64.

Submit
65. Select which of the following are 'Public IP addresses':

Explanation

Public IP addresses are IP addresses that are assigned to devices connected to the public internet. They are unique and can be accessed from anywhere on the internet. In the given options, 11.63.72.2 and 172.168.254.2 are public IP addresses because they are not in the private IP address ranges (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16). The other options (172.28.73.21, 10.110.50.37, and 192.168.0.1) are private IP addresses, which are used for local network communication and cannot be directly accessed from the internet.

Submit
66. What does the firewall action "Redirect" do? Select all true statements.

Explanation

The "Redirect" firewall action redirects a packet to a specified port on the router. It can also redirect a packet directly to the router itself.

Submit
67. Mark the queue types that are available in RouterOS.

Explanation

The available queue types in RouterOS are FIFO - First In First Out (for Bytes or for Packets), SFQ - Stochastic Fairness Queuing, RED - Random Early Detect (or Drop), and PCQ - Per Connection Queuing. LIFO - Last In First Out is not a valid queue type in RouterOS.

Submit
68. Consider the following diagram. We want to communicate from a device on LAN1 to a device on LAN2. Assuming that all necessary configurations are already included on R2, which of the following configurations in R1 would enable this communication?

Explanation

The correct answer is "/ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2". This configuration on R1 adds a route for the destination address 192.168.1.0/24 with a gateway of 192.168.99.2. This means that any traffic destined for the devices on LAN2 will be sent to the gateway 192.168.99.2, which is connected to LAN2. This enables communication between the device on LAN1 and the device on LAN2.

Submit
69. For a user in local PPP secrets/PPP profiles database, it is possible to

Explanation

The given correct answer suggests that in the local PPP secrets/PPP profiles database, it is possible to allow only pppoe login and also allow or deny the use of more than one login by a specific user. This means that the user can only log in using pppoe and can have multiple logins or be restricted to only one login.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 23, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 13, 2019
    Quiz Created by
    Vanyka007
Cancel
  • All
    All (69)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What protocol does ping use?
How many layers does Open Systems Interconnection model have?
The basic unit of a physical network (OSI Layer 1) is the:
What is term for the hardware coded address found on an interface?
MikroTik RouterOS commands can be run once a day by:
Select valid MAC-address
What is possible with Netinstall?
Which default route will be active?...
MAC layer by OSI model is also known as
How many IP addresses can one find in the header of an IP packet?
Collisions are possible in full-duplex Ethernet networks.
The network address is
For static routing functionality, additionally to the RouterOS...
Is ARP used in the IPv6 protocol?
How many usable IP addresses are there in a 20-bit subnet?
Simple Queue number 0 defines 2M for upload and download for the...
Router A and B are both running as PPPoE servers on different...
It is possible to use WPA and WPA2 authentication type at the same...
Is it possible to limit how many clients are able to connect to an...
Which of the following is NOT a valid MAC Address?
Router A and B are both running as PPPoE servers on different...
You have a router with configuration ...
How long is the level 1 (demo) license valid?
Choose all valid hosts address range for subnet 15.242.55.62/27
Is it possible to have PPTP Client and PPTP server on one MikroTik...
Firewall NAT rules process only the first packet of each connection.
A network-ready device is directly connected to a MikroTik RouterBOARD...
A HotSpot is required on the interfaces ether2, ether3, wlan1 (in...
MikroTik RouterOS DHCP client can receive following options:
How many usable IP addresses are there in a 23-bit (255.255.254.0)...
Is it possible for a client to get an IP address but no gateway after...
Which of the following protocols / ports are used for SNMP. (Simple...
What is necessary for PPPoE client configuration?
Which of the following Routes statuses are possible?
You have 802.11 b/g wireless card What frequencies are available to...
Connection state in MikroTik RouterOS is the same thing as TCP state...
Which of the following IP addresses are publicly routable?
You want to use PCQ and allow 256k maximum download and upload for...
Action=redirect is applied in:
Using wireless connect-list it's possible to prioritize connection to...
Mark correct statements.
You need to reboot a RouterBoard after importing a previously exported...
/ip route configuration on router,         ...
PPPoE server only works within one Ethernet broadcast domain that it...
The highest queue priority is
If ARP=reply-only is enabled on one router interface, the router can...
When backing up your router by using the Export command, the following...
Wireless clients (mode=station) will work properly if bridged to the...
To use masquerade, you need to specify
Action redirect allows you to make
PPP Secrets are used for
You have to connect to a RouterBOARD without any previous...
If ARP=reply-only is configured on an interface, what will this...
What is possible with Netinstall?
Netinstall can be used to
We have two radio cards in a point-to-point link with settings:...
Which is correct masquerade rule for 192.168.0.0/24 network on the...
In MikroTik RouterOS, Layer-3 communication between 2 hosts can be...
Mark all features that are compatible with Nstreme
Which computers would be able to communicate directly (without any...
A PC with IP 192.168.1.2 can access internet, and static ARP has been...
Mark possible TCP states in the connection tracking table.
Which ones of the following are valid IP addresses?
What is the default TTL (time to live) on a router that an IP packet...
Select which of the following are 'Public IP addresses':
What does the firewall action "Redirect" do? Select all true...
Mark the queue types that are available in RouterOS.
Consider the following diagram. We want to communicate from a device...
For a user in local PPP secrets/PPP profiles database, it is possible...
Alert!

Advertisement