Router And Servers: MikroTik Certified Network Associate Exam! Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vanyka007
V
Vanyka007
Community Contributor
Quizzes Created: 1 | Total Attempts: 5,141
Questions: 69 | Attempts: 5,141

SettingsSettingsSettings
Router And Servers: MikroTik Certified Network Associate Exam! Trivia Quiz - Quiz

The MikroTik Certified Network Associate (MTCNA) course was prepared to make students familiar with Router OS software and Router Board products and if you are preparing to take the exam, the quiz below is what you need to review all that you have understood in your classes. How about you take this special quiz and get to refresh your memory?


Questions and Answers
  • 1. 

    MAC layer by OSI model is also known as

    • A.

      Layer 2

    • B.

      Layer 7

    • C.

      Layer 1

    • D.

      Layer 6

    • E.

      Layer 3

    Correct Answer
    A. Layer 2
    Explanation
    The correct answer is Layer 2. The MAC layer, also known as the Media Access Control layer, is responsible for controlling access to the physical medium and handling the transmission of data frames. It is located at Layer 2 of the OSI model.

    Rate this question:

  • 2. 

    The basic unit of a physical network (OSI Layer 1) is the:

    • A.

      Frame

    • B.

      Byte

    • C.

      Bit

    • D.

      Header

    Correct Answer
    C. Bit
    Explanation
    The basic unit of a physical network at the OSI Layer 1 is a bit. A bit is the smallest unit of data in a computer and can have a value of either 0 or 1. At the physical layer, data is transmitted in the form of electrical or optical signals, which are represented as bits. These bits are then grouped together to form bytes, frames, and headers at higher layers of the OSI model. However, at the physical layer, the individual units of data being transmitted are bits.

    Rate this question:

  • 3. 

    Which of the following protocols / ports are used for SNMP. (Simple Network Management Protocol)

    • A.

      UDP 162

    • B.

      TCP 25

    • C.

      UDP 161

    • D.

      TCP 161

    • E.

      TCP 162

    • F.

      TCP 123

    Correct Answer(s)
    A. UDP 162
    C. UDP 161
    Explanation
    SNMP (Simple Network Management Protocol) primarily uses UDP (User Datagram Protocol) for communication. UDP port 161 is used for SNMP requests and port 162 is used for SNMP traps. TCP (Transmission Control Protocol) is not commonly used for SNMP, and none of the other ports listed are associated with SNMP.

    Rate this question:

  • 4. 

    Which ones of the following are valid IP addresses?

    • A.

      192.168.13.255

    • B.

      192.168.256.1

    • C.

      10.10.14.0

    • D.

      1.27.14.254

    Correct Answer(s)
    A. 192.168.13.255
    C. 10.10.14.0
    D. 1.27.14.254
    Explanation
    The first IP address, 192.168.13.255, is valid because it falls within the range of 0.0.0.0 to 255.255.255.255, which is the valid range for IP addresses. The second IP address, 192.168.256.1, is not valid because the octet "256" is outside the range of 0 to 255. The third IP address, 10.10.14.0, is valid because all the octets fall within the valid range. The fourth IP address, 1.27.14.254, is also valid because all the octets fall within the valid range.

    Rate this question:

  • 5. 

    Choose all valid hosts address range for subnet 15.242.55.62/27

    • A.

      15.242.55.33-15.242.55.63

    • B.

      15.242.55.32-15.242.55.63

    • C.

      15.242.55.33-15.242.55.62

    • D.

      15.242.55.31-15.242.55.62

    Correct Answer
    C. 15.242.55.33-15.242.55.62
    Explanation
    The given subnet is 15.242.55.62/27, which means that it has a subnet mask of 27 bits. This leaves 5 bits for the host portion of the IP address. The valid hosts address range for this subnet would be from the network address + 1 to the broadcast address - 1.

    The network address can be obtained by setting all the host bits to 0, which gives us 15.242.55.32. The broadcast address can be obtained by setting all the host bits to 1, which gives us 15.242.55.63. Therefore, the valid hosts address range for this subnet is 15.242.55.33-15.242.55.62.

    Rate this question:

  • 6. 

    How many IP addresses can one find in the header of an IP packet?

    • A.

      2

    • B.

      3

    • C.

      1

    • D.

      4

    Correct Answer
    A. 2
    Explanation
    In the header of an IP packet, there are two IP addresses. The first IP address is the source IP address, which identifies the sender of the packet. The second IP address is the destination IP address, which identifies the intended recipient of the packet. These IP addresses are crucial for routing the packet across the network and ensuring it reaches the correct destination.

    Rate this question:

  • 7. 

    In MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved by using an address

    • A.

      /30

    • B.

      /31

    • C.

      /32

    • D.

      /29

    Correct Answer(s)
    A. /30
    C. /32
    D. /29
    Explanation
    In MikroTik RouterOS, a /30 subnet mask is used for Layer-3 communication between 2 hosts. A /30 subnet mask provides 2 usable IP addresses, allowing for communication between the two hosts. A /31 subnet mask is not commonly used as it only provides 1 usable IP address. A /32 subnet mask is used for loopback addresses and a /29 subnet mask provides 6 usable IP addresses, which is more than what is required for communication between 2 hosts.

    Rate this question:

  • 8. 

    Which of the following is NOT a valid MAC Address?

    • A.

      88:0C:00:99:5F:EF

    • B.

      95:B5:DD:EE:78:8A

    • C.

      13:16:86:53:89:43

    • D.

      EA:BA:AA:EE:FF:CB

    • E.

      80:GF:AA:67:13:5D

    Correct Answer
    E. 80:GF:AA:67:13:5D
  • 9. 

    A network-ready device is directly connected to a MikroTik RouterBOARD 750 with a correct U.T.P. RJ45 functioning cable. The device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of 255.255.255.252. What will be a valid IPv4 address for the RouterBOARD 750 for a successful connection to the device?

    • A.

      192.168.100.70/255.255.255.252

    • B.

      192.168.100.69/255.255.255.252

    • C.

      192.168.100.68/255.255.255.252

    • D.

      192.168.100.71/255.255.255.252

    Correct Answer
    B. 192.168.100.69/255.255.255.252
    Explanation
    The given device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of 255.255.255.252. This means that the device is using a /30 subnet, which allows for only 2 usable IP addresses. The valid IP addresses in this subnet range are 192.168.100.68 and 192.168.100.69. Since the device is already using 192.168.100.70, the valid IP address for the RouterBOARD 750 to successfully connect to the device would be 192.168.100.69.

    Rate this question:

  • 10. 

    You have a router with configuration - Public IP :202.168.125.45/24 - Default gateway:202.168.125.1 - DNS server: 248.115.148.136, 248.115.148.137 - Local IP: 192.168.2.1/24 Mark the correct configuration on client PC to access to the Internet

    • A.

      IP:192.168.2.253/24 gateway:202.168.0.1

    • B.

      IP:192.168.2.115/24 gateway: 192.168.2.1

    • C.

      IP:192.168.2.2/24 gateway:202.168.125.45

    • D.

      IP:192.168.1.223/24 gateway:248.115.148.136

    • E.

      IP:192.168.0.1/24 gateway:192.168.2.1

    Correct Answer
    B. IP:192.168.2.115/24 gateway: 192.168.2.1
    Explanation
    The correct configuration on the client PC to access the internet is IP:192.168.2.115/24 gateway: 192.168.2.1. This is because the client PC should have an IP address within the same subnet as the router's local IP address, which is 192.168.2.1/24. The gateway should also be set to the router's local IP address, which is 192.168.2.1, in order to access the internet through the router.

    Rate this question:

  • 11. 

    Collisions are possible in full-duplex Ethernet networks.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Collisions are not possible in full-duplex Ethernet networks. In full-duplex mode, data can be transmitted and received simultaneously, eliminating the possibility of collisions. Each device has its own dedicated transmit and receive channels, allowing for full-duplex communication without any collisions.

    Rate this question:

  • 12. 

    Which of the following IP addresses are publicly routable?

    • A.

      127.34.155.3

    • B.

      172.16.13.23

    • C.

      192.168.1.4

    • D.

      11.3.10.4

    Correct Answer
    D. 11.3.10.4
    Explanation
    The IP address 11.3.10.4 is publicly routable because it falls within the range of public IP addresses. The other three IP addresses (127.34.155.3, 172.16.13.23, and 192.168.1.4) are not publicly routable because they are reserved for private networks and cannot be directly accessed over the internet.

    Rate this question:

  • 13. 

    The network address is

    • A.

      The first usable address of the subnet

    • B.

      The last address of the subnet

    • C.

      The first address of the subnet

    Correct Answer
    C. The first address of the subnet
    Explanation
    The network address refers to the first address of the subnet. It is the address that represents the network itself and is used for routing purposes. The first usable address of the subnet would be the second address, as the first address is reserved for the network address. The last address of the subnet is typically used as the broadcast address, so it is not considered the network address.

    Rate this question:

  • 14. 

    What is term for the hardware coded address found on an interface?

    • A.

      FQDN Address

    • B.

      Interface Address

    • C.

      MAC Address

    • D.

      IP Address

    Correct Answer
    C. MAC Address
    Explanation
    A MAC address, also known as a Media Access Control address, is a hardware coded address found on an interface. It is a unique identifier assigned to network interfaces for communications on the physical network. MAC addresses are used to ensure that data is sent to the correct device within a network. Unlike IP addresses that can change, MAC addresses are permanent and cannot be modified. Therefore, the correct answer for the term of the hardware coded address found on an interface is MAC Address.

    Rate this question:

  • 15. 

    If ARP=reply-only is enabled on one router interface, the router can add dynamic ARP entries for the particular interface.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    If ARP=reply-only is enabled on one router interface, the router cannot add dynamic ARP entries for that interface. The reply-only mode only allows the router to respond to ARP requests from other devices, but it does not allow the router to initiate ARP requests or add dynamic ARP entries. Therefore, the statement is false.

    Rate this question:

  • 16. 

    How many layers does Open Systems Interconnection model have?

    • A.

      9

    • B.

      5

    • C.

      12

    • D.

      7

    • E.

      6

    Correct Answer
    D. 7
    Explanation
    The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it. These layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Therefore, the correct answer is 7.

    Rate this question:

  • 17. 

    Select which of the following are 'Public IP addresses':

    • A.

      172.28.73.21

    • B.

      10.110.50.37

    • C.

      11.63.72.2

    • D.

      192.168.0.1

    • E.

      172.168.254.2

    Correct Answer(s)
    C. 11.63.72.2
    E. 172.168.254.2
    Explanation
    Public IP addresses are IP addresses that are assigned to devices connected to the public internet. They are unique and can be accessed from anywhere on the internet. In the given options, 11.63.72.2 and 172.168.254.2 are public IP addresses because they are not in the private IP address ranges (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16). The other options (172.28.73.21, 10.110.50.37, and 192.168.0.1) are private IP addresses, which are used for local network communication and cannot be directly accessed from the internet.

    Rate this question:

  • 18. 

    Select valid MAC-address

    • A.

      192.168.0.0/16

    • B.

      00:00:5E:80:EE:B0

    • C.

      AEC8:21F1:AA44:54FF:1111:DDAE:0212:1201

    • D.

      G2:60:CF:21:99:H0

    Correct Answer
    B. 00:00:5E:80:EE:B0
    Explanation
    The given MAC address, 00:00:5E:80:EE:B0, is a valid MAC address. MAC addresses are unique identifiers assigned to network interfaces, and they consist of six pairs of hexadecimal digits separated by colons. The given MAC address follows this format and does not contain any invalid characters or incorrect formatting. Therefore, it is a valid MAC address.

    Rate this question:

  • 19. 

    How many usable IP addresses are there in a 23-bit (255.255.254.0) subnet?

    • A.

      254

    • B.

      512

    • C.

      508

    • D.

      510

    Correct Answer
    D. 510
    Explanation
    A 23-bit subnet mask (255.255.254.0) allows for a total of 9 bits to be used for host addresses. Since each bit can be either 0 or 1, this results in 2^9 possible combinations. However, the first and last combinations are reserved for network and broadcast addresses, leaving 2^9 - 2 = 510 usable IP addresses.

    Rate this question:

  • 20. 

    How many usable IP addresses are there in a 20-bit subnet?

    • A.

      2047

    • B.

      4096

    • C.

      2048

    • D.

      2046

    • E.

      4094

    Correct Answer
    E. 4094
    Explanation
    A 20-bit subnet allows for 2^20 total addresses. However, 2 addresses are reserved for network and broadcast addresses, leaving 2^20 - 2 = 4094 usable IP addresses.

    Rate this question:

  • 21. 

    If ARP=reply-only is configured on an interface, what will this interface do?

    • A.

      Accept all IP addresses listed in /ip arp as static entries

    • B.

      Accept all MAC-addresses listed in /ip arp as static entries

    • C.

      Add new MAC addresses in /ip arp list

    • D.

      Add new IP addresses in /ip arp list

    • E.

      Accept all IP/MAC combinations listed in /ip arp as static entries

    Correct Answer
    E. Accept all IP/MAC combinations listed in /ip arp as static entries
    Explanation
    When ARP=reply-only is configured on an interface, the interface will accept all IP/MAC combinations listed in the /ip arp list as static entries. This means that any IP address and MAC address combination listed in the ARP table will be considered as valid and static, and the interface will not send ARP requests for these entries. This can be useful in scenarios where specific IP/MAC combinations need to be treated as static and not be subject to ARP requests.

    Rate this question:

  • 22. 

    What protocol does ping use?

    • A.

      UDP

    • B.

      ICMP

    • C.

      TCP

    • D.

      ARP

    Correct Answer
    B. ICMP
    Explanation
    Ping uses the ICMP (Internet Control Message Protocol) protocol. ICMP is a network protocol used to send diagnostic messages and error reports between network devices. Ping uses ICMP echo requests and echo replies to measure the round-trip time and packet loss between two devices on a network. ICMP is a connectionless protocol that operates at the network layer of the OSI model, making it suitable for troubleshooting network connectivity and determining if a host is reachable.

    Rate this question:

  • 23. 

    Which computers would be able to communicate directly (without any routers involved)

    • A.

      192.168.0.5/26 and 192.168.0.100/28

    • B.

      192.168.17.15/29 and 192.168.17.20/28

    • C.

      10.5.5.1/24 and 10.5.5.100/25

    • D.

      10.10.0.17/22 and 10.10.1.30/23

    Correct Answer(s)
    C. 10.5.5.1/24 and 10.5.5.100/25
    D. 10.10.0.17/22 and 10.10.1.30/23
  • 24. 

    What does the firewall action "Redirect" do? Select all true statements.

    • A.

      Redirects a packet to a specified port on the router

    • B.

      Redirects a packet to the router

    • C.

      Redirects a packet to a specified IP

    • D.

      Redirects a packet to a specified port on a host in the network

    Correct Answer(s)
    A. Redirects a packet to a specified port on the router
    B. Redirects a packet to the router
    Explanation
    The "Redirect" firewall action redirects a packet to a specified port on the router. It can also redirect a packet directly to the router itself.

    Rate this question:

  • 25. 

    What is necessary for PPPoE client configuration?

    • A.

      Ip firewall nat masquerade rule

    • B.

      Interface (on which PPPoE client is going to work)

    • C.

      Static IP address on PPPoE client interface

    Correct Answer
    B. Interface (on which PPPoE client is going to work)
    Explanation
    The necessary requirement for PPPoE client configuration is the interface on which the PPPoE client is going to work. This is because the interface is the connection point between the client and the PPPoE server, allowing the client to establish and maintain the PPPoE connection. Without specifying the interface, the client would not be able to connect to the PPPoE server and establish the required connection.

    Rate this question:

  • 26. 

    MikroTik RouterOS commands can be run once a day by:

    • A.

      /system cron

    • B.

      /system watchdog

    • C.

      /system scheduler

    Correct Answer
    C. /system scheduler
    Explanation
    The correct answer is /system scheduler. MikroTik RouterOS commands can be scheduled to run at specific times using the /system scheduler command. This allows users to automate tasks and execute commands at regular intervals, such as once a day. The scheduler can be configured to run commands at a specific time, on specific days of the week, or even periodically with a defined interval. This feature provides flexibility and convenience for managing and automating tasks on the MikroTik router.

    Rate this question:

  • 27. 

    It is possible to use WPA and WPA2 authentication type at the same time with one security profile.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is possible to use both WPA and WPA2 authentication types simultaneously within a single security profile. This allows for increased flexibility and compatibility with different devices and network configurations. By supporting both authentication types, the network can accommodate devices that only support WPA or WPA2, ensuring that all devices can connect securely. This capability enhances the overall security and accessibility of the network.

    Rate this question:

  • 28. 

    Netinstall can be used to

    • A.

      Keep configuration, but reset a lost admin password

    • B.

      Install package for different hardware architecture

    • C.

      Install different software version (upgrade or downgrade)

    • D.

      Reinstall software without losing licence

    Correct Answer(s)
    C. Install different software version (upgrade or downgrade)
    D. Reinstall software without losing licence
    Explanation
    Netinstall can be used to install different software versions, allowing for upgrades or downgrades. It can also be used to reinstall software without losing the license. This means that if there is a need to change the software version or if there is a need to reinstall the software, Netinstall can be used to accomplish this without the risk of losing the license.

    Rate this question:

  • 29. 

    The highest queue priority is

    • A.

      16

    • B.

      1

    • C.

      256

    • D.

      8

    Correct Answer
    B. 1
    Explanation
    The correct answer is 1 because in a queue, the priority is usually determined by a numerical value, with lower numbers indicating higher priority. In this case, 1 has the lowest value among the given options, indicating the highest priority in the queue.

    Rate this question:

  • 30. 

    Is it possible to limit how many clients are able to connect to an access point?

    • A.

      No it's not possible at all

    • B.

      Yes

    • C.

      Yes, but only with access-lists

    Correct Answer
    C. Yes, but only with access-lists
    Explanation
    Yes, it is possible to limit how many clients are able to connect to an access point using access-lists. Access-lists allow network administrators to control and filter network traffic based on specific criteria, such as the number of clients allowed to connect. By configuring access-lists on the access point, the administrator can set a limit on the maximum number of clients that can connect to the access point simultaneously.

    Rate this question:

  • 31. 

    Which of the following Routes statuses are possible?

    • A.

      S = Static

    • B.

      C = Connected

    • C.

      D = Drop

    • D.

      A = Active

    Correct Answer(s)
    A. S = Static
    B. C = Connected
    D. A = Active
    Explanation
    The possible route statuses are Static, Connected, and Active. Static routes are manually configured by the network administrator and do not change unless manually updated. Connected routes are automatically created by the router when it detects a directly connected network. Active routes are those that are currently being used for forwarding packets. The Drop status is not mentioned in the answer, so it is not a possible route status.

    Rate this question:

  • 32. 

    Wireless clients (mode=station) will work properly if bridged to the ethernet.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Wireless clients (mode=station) will not work properly if bridged to the ethernet. This is because when a wireless client is bridged to the ethernet, it essentially becomes a part of the wired network and loses its ability to connect to the wireless network. As a result, it will not be able to communicate with other wireless devices or access the internet wirelessly. Therefore, the statement is false.

    Rate this question:

  • 33. 

    For static routing functionality, additionally to the RouterOS 'system' package, you will also need the following software package:

    • A.

      Dhcp

    • B.

      No extra package required

    • C.

      Routing

    • D.

      Advanced-tools

    Correct Answer
    B. No extra package required
    Explanation
    The correct answer is "no extra package required". This means that for static routing functionality, you do not need any additional software package apart from the RouterOS 'system' package. This implies that the necessary routing functionality is already included in the 'system' package itself, and there is no need to install any other package for static routing.

    Rate this question:

  • 34. 

    Simple Queue number 0 defines 2M for upload and download for the target IP 10.10.0.33. Simple Queue number 1 defines 4M for upload and download for the target IP 10.10.0.33. Client 10.10.0.33 is been able to obtain

    • A.

      2M upload/download

    • B.

      4M upload/download

    • C.

      0M upload/download

    • D.

      6M upload/download

    Correct Answer
    A. 2M upload/download
    Explanation
    The client with IP address 10.10.0.33 is able to obtain 2M upload/download because Simple Queue number 0 defines 2M for upload and download for that target IP.

    Rate this question:

  • 35. 

    For a user in local PPP secrets/PPP profiles database, it is possible to

    • A.

      Allow only pppoe login

    • B.

      Deny services (like telnet) only for this user or for one group of users

    • C.

      Set max values for total transferred bytes (up- and download)

    • D.

      Allow/deny use of more than one login by this user

    • E.

      Allow login by pppoe and pptp, but deny login by l2tp

    Correct Answer(s)
    A. Allow only pppoe login
    D. Allow/deny use of more than one login by this user
    Explanation
    The given correct answer suggests that in the local PPP secrets/PPP profiles database, it is possible to allow only pppoe login and also allow or deny the use of more than one login by a specific user. This means that the user can only log in using pppoe and can have multiple logins or be restricted to only one login.

    Rate this question:

  • 36. 

    Consider the following diagram. We want to communicate from a device on LAN1 to a device on LAN2. Assuming that all necessary configurations are already included on R2, which of the following configurations in R1 would enable this communication?

    • A.

      /ip route add dst-address=192.168.1.0/24 src-address=192.168.0.0/24 gateway=192.168.99.2

    • B.

      /ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2

    • C.

      /ip route add dst-address=0.0.0.0/0 gateway=192.168.99.2

    • D.

      /ip route add dst-address=0.0.0.0/0 gateway=Ether1

    • E.

      /ip route add dst-address=192.168.0.0/24 gateway=192.168.0.1

    Correct Answer
    B. /ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2
    Explanation
    The correct answer is "/ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2". This configuration on R1 adds a route for the destination address 192.168.1.0/24 with a gateway of 192.168.99.2. This means that any traffic destined for the devices on LAN2 will be sent to the gateway 192.168.99.2, which is connected to LAN2. This enables communication between the device on LAN1 and the device on LAN2.

    Rate this question:

  • 37. 

    You have to connect to a RouterBOARD without any previous configuration. Select all possibilities to connect and do some basic configuration

    • A.

      Serial Connection

    • B.

      MAC-Winbox

    • C.

      Attach monitor/keyboard

    • D.

      Telnet

    Correct Answer(s)
    A. Serial Connection
    B. MAC-Winbox
    D. Telnet
    Explanation
    To connect to a RouterBOARD without any previous configuration, there are three possibilities: Serial Connection, MAC-Winbox, and Telnet. A serial connection involves connecting a computer to the RouterBOARD using a serial cable, allowing for direct communication and configuration. MAC-Winbox refers to using the MAC address of the RouterBOARD to connect and configure it using the Winbox software. Telnet is another option where the RouterBOARD can be accessed and configured remotely using the Telnet protocol. These three methods provide different ways to connect and perform basic configuration on the RouterBOARD.

    Rate this question:

  • 38. 

    PPP Secrets are used for

    • A.

      L2TP clients

    • B.

      PPP clients

    • C.

      IPSec clients

    • D.

      PPtP clients

    • E.

      PPPoE client

    • F.

      Router users

    Correct Answer(s)
    A. L2TP clients
    B. PPP clients
    D. PPtP clients
    E. PPPoE client
    Explanation
    PPP Secrets are used for authenticating and authorizing various types of clients in a network. L2TP clients, PPP clients, PPtP clients, and PPPoE clients all require PPP Secrets for establishing a secure connection with the network. These secrets ensure that only authorized clients can access the network resources and prevent unauthorized access. Router users, on the other hand, typically use different authentication methods such as username and password or SSH keys, and do not rely on PPP Secrets for authentication.

    Rate this question:

  • 39. 

    Firewall NAT rules process only the first packet of each connection.

    • A.

      TRUE

    • B.

      FALSE

    Correct Answer
    B. FALSE
    Explanation
    Firewall NAT rules do not only process the first packet of each connection. Instead, they process all packets of a connection based on the defined NAT rules. These rules are responsible for translating the source and/or destination IP addresses and ports of network packets, allowing for proper routing and communication between different networks. Therefore, the correct answer is FALSE.

    Rate this question:

  • 40. 

    Using wireless connect-list it’s possible to prioritize connection to one Access Point over another Access Point by changing the order of the entries.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. Wireless connect-list allows users to prioritize their connection to one Access Point over another by changing the order of the entries. This means that users can specify which Access Point they want to connect to first, ensuring a higher level of preference for that particular Access Point. This feature is useful in situations where multiple Access Points are available, but the user wants to prioritize their connection to a specific one.

    Rate this question:

  • 41. 

    What is possible with Netinstall?

    • A.

      MikroTik RouterOS reinstall

    • B.

      MikroTik RouterOS configuration reset

    • C.

      MikroTik RouterOS password reset with saving router's configuration

    Correct Answer
    A. MikroTik RouterOS reinstall
    Explanation
    Netinstall is a tool provided by MikroTik that allows users to reinstall the RouterOS operating system on their MikroTik devices. This can be useful in situations where the RouterOS has become corrupted or is not functioning properly. By using Netinstall, users can easily restore their devices to a working state by reinstalling the RouterOS.

    Rate this question:

  • 42. 

    Mark possible TCP states in the connection tracking table.

    • A.

      New

    • B.

      Syn

    • C.

      Related

    • D.

      Invalid

    • E.

      Established

    • F.

      Closed

    Correct Answer(s)
    A. New
    C. Related
    D. Invalid
    E. Established
    Explanation
    The given answer correctly identifies the possible TCP states in the connection tracking table. "New" represents a new connection that has been initiated, "Related" indicates a connection that is related to an existing connection, "Invalid" signifies an invalid or unauthorized connection, and "Established" represents a connection that is currently active and established. "Closed" is not included in the answer as it represents a state where the connection has been terminated.

    Rate this question:

  • 43. 

    Mark correct statements.

    • A.

      Export files are not editable

    • B.

      Backup files are not editable

    • C.

      Backup files are editable

    Correct Answer
    B. Backup files are not editable
    Explanation
    Backup files are not editable because they are created as a precautionary measure to safeguard data and restore it in case of any loss or corruption. These files are typically created in a format that cannot be easily modified or edited to prevent accidental changes or tampering with the backup data. Therefore, the statement that backup files are not editable is correct.

    Rate this question:

  • 44. 

    /ip route configuration on router,                    /ip route add dst-address=0.0.0.0/0 gateway=192.168.0.1 /ip route add dst-address=192.168.1.0/24 gateway=192.168.0.2 /ip route add dst-address=192.168.2.0/24 gateway=192.168.0.3 /ip route add dst-address=192.168.3.0/26 gateway=192.168.0.4 Router needs to send packets to 192.168.3.240. Which gateway will be used?

    • A.

      192.168.0.2

    • B.

      192.168.0.1

    • C.

      192.168.0.4

    • D.

      192.168.0.3

    Correct Answer
    B. 192.168.0.1
    Explanation
    Route 1: dst-address=0.0.0.0/0 with gateway=192.168.0.1 (this is a default route)
    Route 2: dst-address=192.168.1.0/24 with gateway=192.168.0.2
    Route 3: dst-address=192.168.2.0/24 with gateway=192.168.0.3
    Route 4: dst-address=192.168.3.0/26 with gateway=192.168.0.4
    The destination IP 192.168.3.240 needs to be checked against each route:
    192.168.3.240 does not match 0.0.0.0/0 (default route) specifically, but it is the least specific route.
    192.168.3.240 does not fall within 192.168.1.0/24 or 192.168.2.0/24.
    Route 4 (192.168.3.0/26) covers the IP range 192.168.3.0 to 192.168.3.63, which does not include 192.168.3.240.
    Since none of the specific routes cover 192.168.3.240, the router will fall back to the default route.
    Therefore, the gateway 192.168.0.1 will be used.

    Rate this question:

  • 45. 

    PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there is a router between server and end-user host, it will not be able to create PPPoE tunnel to that PPPoE server.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because a PPPoE server can work across multiple Ethernet broadcast domains as long as there is a router connecting those domains. The router will forward the PPPoE packets between the server and the end-user host, allowing the creation of a PPPoE tunnel.

    Rate this question:

  • 46. 

    To use masquerade, you need to specify

    • A.

      Action=masquerade, out-interface, chain=src-nat

    • B.

      Action=masquerade, out-interface, chain=dst-nat

    • C.

      Action=masquerade, in-interface, chain=src-nat

    • D.

      Action=accept, out-interface, chain=src-nat

    Correct Answer
    A. Action=masquerade, out-interface, chain=src-nat
    Explanation
    The correct answer is "action=masquerade, out-interface, chain=src-nat" because when using masquerade, the action needs to be set as "masquerade" to modify the source IP address of outgoing packets. The "out-interface" parameter specifies the interface that the packets will be going out through, and the "chain=src-nat" parameter indicates that the masquerade action should be applied in the source NAT chain.

    Rate this question:

  • 47. 

    You want to use PCQ and allow 256k maximum download and upload for each client. Choose correct argument values for the required queue.

    • A.

      Kind=pcq pcq-rate=1256000 pcq-classifier=dst-address

    • B.

      Kind=pcq pcq-rate=5000000 pcq-classifier=dst-address

    • C.

      Kind=pcq pcq-rate=5000000 pcq-classifier=src-address

    • D.

      Kind=pcq pcq-rate=256000 pcq-classifier=dst-address

    • E.

      Kind=pcq pcq-rate=256000 pcq-classifier=src-address

    Correct Answer(s)
    D. Kind=pcq pcq-rate=256000 pcq-classifier=dst-address
    E. Kind=pcq pcq-rate=256000 pcq-classifier=src-address
    Explanation
    The correct answer is "kind=pcq pcq-rate=256000 pcq-classifier=dst-address,kind=pcq pcq-rate=256000 pcq-classifier=src-address". This is because the question states that the desired maximum download and upload for each client is 256k. Therefore, the pcq-rate should be set to 256000. Additionally, the question does not specify whether the classifier should be based on the destination address or the source address, so both options are valid.

    Rate this question:

  • 48. 

    We have two radio cards in a point-to-point link with settings: Card Nr 1.: mode=ap-bridge ssid="office" frequency=2447 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa Card Nr 2.: mode=station ssid="office" frequency=2412 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa2 Is Card Nr2. able to connect to Card Nr 1.?

    • A.

      Yes, if Nstreme is enabled or disabled on both

    • B.

      Yes, when security profile settings are compatible with each other and Nstreme is enabled or disabled on both

    • C.

      No. because of the different frequencies

    • D.

      No. because of the different security profiles

    Correct Answer
    C. No. because of the different frequencies
    Explanation
    Card Nr 2 is not able to connect to Card Nr 1 because they are operating on different frequencies. The frequency of Card Nr 1 is 2447, while the frequency of Card Nr 2 is 2412. In order for two devices to connect in a point-to-point link, they need to be operating on the same frequency.

    Rate this question:

  • 49. 

    How long is the level 1 (demo) license valid?

    • A.

      24 hours

    • B.

      Infinite time

    • C.

      1 month

    • D.

      1 year

    Correct Answer
    B. Infinite time
    Explanation
    The level 1 (demo) license is valid for an infinite amount of time. This means that there is no expiration date or time limit for using the level 1 license. Users can continue to access and utilize the benefits of the license for as long as they need or want to.

    Rate this question:

  • 50. 

    Router A and B are both running as PPPoE servers on different broadcast domains of your network Are it possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is not possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers. Each router running as a PPPoE server operates on its own broadcast domain and manages its own set of accounts for authentication. The "/PPP secret" accounts are specific to Router B and cannot be accessed or used by Router A for authentication purposes. Therefore, the correct answer is False.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 13, 2019
    Quiz Created by
    Vanyka007
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.