Mtcna Quiz Questions And Answers

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS, Computer Science |
Computer Expert
Review Board Member
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.
, MS, Computer Science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Yosep Tri
Y
Yosep Tri
Community Contributor
Quizzes Created: 1 | Total Attempts: 40,290
Questions: 41 | Attempts: 40,667

SettingsSettingsSettings
Mtcna Quiz Questions And Answers - Quiz

Need a practice session on MTCNA? Well, here we have got you this essential online quiz containing questions and answers covering wide aspects of the topic. It has questions ranging from easy, medium, and hard levels that will not only test your knowledge but also enhance it. So, if you are looking for an informative quiz on the topic, you have come to the right place. All the best!


Questions and Answers
  • 1. 

    Action = Redirect is applied in:

    • A.

      Chain=srcnat

    • B.

      Chain=dstnat

    • C.

      Chain=foward

    • D.

      All of the above

    Correct Answer
    B. Chain=dstnat
    Explanation
    The Action = Redirect is applied in the chain=dstnat. This means that when a packet matches the rules in the destination NAT chain, it will be redirected to a different destination address or port. This can be useful for redirecting incoming traffic to a specific server or service.

    Rate this question:

  • 2. 

    Choose all valid host address ranges for subnet 15.242.55.62/27

    • A.

      15.242.55.31-15.242.55.62

    • B.

      15.242.55.32-15.242.55.63

    • C.

      15.242.55.33-15.242.55.62

    • D.

      15.242.55.33-15.242.55.63

    Correct Answer
    C. 15.242.55.33-15.242.55.62
    Explanation
    The given subnet 15.242.55.62/27 has a network address of 15.242.55.32 and a broadcast address of 15.242.55.63. The valid host address range is from the first usable address after the network address, which is 15.242.55.33, to the last usable address before the broadcast address, which is 15.242.55.62. Therefore, the correct answer is 15.242.55.33-15.242.55.62.

    Rate this question:

  • 3. 

    You have an 802.11b/g wireless card. What frequencies are available to you?

    • A.

      5800MHz

    • B.

      2412MHz

    • C.

      5210MHz

    • D.

      2422MHz

    • E.

      2327MHz

    Correct Answer(s)
    B. 2412MHz
    D. 2422MHz
    Explanation
    The given answer states that the frequencies available for a 802.11b/g wireless card are 2412MHz and 2422MHz. This is because 802.11b/g wireless cards operate in the 2.4GHz frequency range, and the frequencies 2412MHz and 2422MHz fall within this range.

    Rate this question:

  • 4. 

    Action=redirect allows you to make?

    • A.

      Transparent DNS Cache

    • B.

      Foward DNS to another device IP address

    • C.

      Enable local service

    • D.

      Transparent HTTP Proxy

    Correct Answer(s)
    A. Transparent DNS Cache
    D. Transparent HTTP Proxy
    Explanation
    The action=redirect allows you to configure a transparent DNS cache and a transparent HTTP proxy. A transparent DNS cache stores DNS responses locally, reducing the need to query external DNS servers repeatedly. This improves DNS resolution time and reduces network latency. On the other hand, a transparent HTTP proxy intercepts and forwards HTTP requests to another device's IP address, allowing for various functionalities like caching, filtering, and logging. Both of these options can be enabled using the action=redirect command.

    Rate this question:

  • 5. 

    Which is correct masquerade rule for 192.168.0.0/24 network on the router with outgoing interface=ether1

    • A.

      /ip firewall nat add action=masquerade chain=srcnat

    • B.

      /ip firewall nat add action=masquerade chain=srcnat src-address=192.168.0.0/24

    • C.

      /ip firewall nat add action=masquerade out-interface=ether1 chain=dstnat

    • D.

      /ip firewall nat add action=masquerade chain=srcnat out-interface=ether1

    Correct Answer
    D. /ip firewall nat add action=masquerade chain=srcnat out-interface=ether1
    Explanation
    This rule correctly specifies that any traffic originating from the 192.168.0.0/24 network (source NAT) and going out through the 'ether1' interface should be masqueraded. It ensures that the internal IP addresses are translated to the IP address of the ether1 interface when they go out to the internet.

    Rate this question:

  • 6. 

    What Letter(s) appears next to the route, which is automatically created by ROS (RouterOS) when a user adds a valid address to an active interface?

    • A.

      I

    • B.

      D

    • C.

      A

    • D.

      S

    • E.

      C

    Correct Answer
    D. S
    Explanation
    In MikroTik RouterOS, the letter "S" appears next to a route that is automatically created when a user adds a valid address to an active interface. The "S" indicates a "Static" route, and it is automatically created when an IP address is assigned to an interface.

    Rate this question:

  • 7. 

    Can you manually add drivers to RouterOS in case your PCI Ethernet card is not recognized, and it's a driver issue?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    In MikroTik RouterOS, you cannot manually add drivers. The RouterOS operating system includes a set of built-in drivers for supported hardware, and you cannot add or install additional drivers manually. If a PCI Ethernet card is not recognized, it may indicate that RouterOS does not have the necessary driver for that specific hardware. In such cases, it's recommended to check the compatibility of the hardware with RouterOS and use supported devices.

    Rate this question:

  • 8. 

    For static routing functionality, additionally to the RouterOS system package, you will also need the following software package:

    • A.

      Routing

    • B.

      Dhcp

    • C.

      Advance-tools

    • D.

      None

    Correct Answer
    D. None
    Explanation
    For static routing functionality in MikroTik RouterOS, you do not need an additional software package. The basic "routing" functionality is included in the RouterOS system package itself. Therefore, the correct answer is C. None.

    Rate this question:

  • 9. 

    Which are a necessary section in /queue simple to set bandwidth limitation?

    • A.

      Target-address, max-limit, dst-address

    • B.

      Max-limit

    • C.

      Target-address, dst-address

    • D.

      Target-address, max limit

    Correct Answer
    D. Target-address, max limit
    Explanation
    In the /queue simple section, the "target-address" parameter is necessary to specify the IP address or address range to which the bandwidth limitation will be applied. The "max limit" parameter is also necessary to set the maximum bandwidth limit for the specified target address. Therefore, the correct answer is "target-address, max limit". The other options either do not include both necessary parameters or include additional unnecessary parameters.

    Rate this question:

  • 10. 

    What protocol is used for Ping and Trace Route?

    • A.

      DHCP

    • B.

      IP

    • C.

      ICMP

    • D.

      TCP

    • E.

      UDP

    Correct Answer
    C. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer for the question. ICMP is a network protocol that is used for diagnostic and control purposes. It is primarily used for Ping and Trace Route utilities. Ping uses ICMP Echo Request and Echo Reply messages to test the reachability of a network host. Trace Route uses ICMP Time Exceeded and Destination Unreachable messages to trace the route taken by packets through an IP network. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network. IP (Internet Protocol) is the network layer protocol responsible for addressing and routing packets. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are transport layer protocols used for data transmission.

    Rate this question:

  • 11. 

    From which of the following locations can you obtain Winbox?

    • A.

      Router webpage

    • B.

      Files menu in your router

    • C.

      Via the console cable

    • D.

      Mikrotik.com

    Correct Answer(s)
    A. Router webpage
    D. Mikrotik.com
    Explanation
    You can obtain Winbox from the router webpage or from mikrotik.com. The router webpage is a common location to access and download software for the router, including Winbox. Mikrotik.com is the official website of MikroTik, where you can find various resources and downloads, including Winbox.

    Rate this question:

  • 12. 

    Two Host, A, and B are connected to broadcast LAN. Select all the answer showing pairs of IP address/mask which would allow IP connections to be established between the two hosts

    • A.

      A: 10.1.2.66/25 and B:10.1.2.109/26

    • B.

      A: 10.2.2.1/23 and B: 10.2.0.1/22

    • C.

      A: 10.1.2.192/24 and B: 10.1.2.129/26

    • D.

      A: 10.2.1.0/23 and B: 10.2.0.1/22

    Correct Answer
    C. A: 10.1.2.192/24 and B: 10.1.2.129/26
    Explanation
    The IP address/mask pair A: 10.1.2.192/24 and B: 10.1.2.129/26 allows IP connections to be established between the two hosts. The IP address 10.1.2.192 with a subnet mask of /24 indicates that the first 24 bits are the network address, allowing for 256 possible host addresses. The IP address 10.1.2.129 with a subnet mask of /26 indicates that the first 26 bits are the network address, allowing for 64 possible host addresses. Since both IP addresses have the same network address (10.1.2.0), they can establish IP connections.

    Rate this question:

  • 13. 

    Why is it useful to set a Radio Name on the radio interfaces?

    • A.

      To identify a station in a list of connected clients.

    • B.

      To identify a station in the Access List.

    • C.

      To identify a station in Neighbor discovery.

    • D.

      None of the above

    Correct Answer
    A. To identify a station in a list of connected clients.
    Explanation
    Setting a unique Radio Name on radio interfaces, such as in a Wi-Fi network configuration, helps in identifying a station (client device) in a list of connected clients. This naming convention makes it easier for network administrators to manage and monitor the devices connected to the network, troubleshoot issues, and allocate resources effectively.

    Rate this question:

  • 14. 

    What kind of users are listed in the Secrets window of the PPP menu?

    • A.

      PPTP users

    • B.

      Winbox users

    • C.

      L2TP users

    • D.

      Wireless users

    • E.

      PPPOE users

    • F.

      Hotspot users

    Correct Answer(s)
    A. PPTP users
    C. L2TP users
    E. PPPOE users
    Explanation
    The Secrets window in the PPP menu lists PPTP users, L2TP users, and PPPOE users. These are the different types of users that can be authenticated and authorized to access the network through PPP protocols. The Secrets window allows the network administrator to manage and configure the settings for these specific types of users, such as setting up their login credentials, IP addresses, and other authentication parameters.

    Rate this question:

  • 15. 

    Router A and B are both running as PPPoE servers on different broadcast domains of your network. Is it possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    No, it is not possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers. This is because each router is running as a PPPoE server on different broadcast domains, which means they are in separate networks and cannot directly access each other's resources. Each router will have its own set of PPPoE accounts and credentials for authentication.

    Rate this question:

  • 16. 

    Mikrotik RouterOS DHCP client can receive the following options:

    • A.

      Byte limit

    • B.

      IP Gateway

    • C.

      Rate Limit

    • D.

      Uptime Limit

    • E.

      IP Address and Subnet

    Correct Answer(s)
    B. IP Gateway
    E. IP Address and Subnet
    Explanation
    The Mikrotik RouterOS DHCP client can receive the IP Gateway and IP Address and Subnet options. The IP Gateway option specifies the IP address of the default gateway that the client should use, while the IP Address and Subnet option provides the client with its own IP address and subnet mask. These options are important for the client to successfully connect to the network and communicate with other devices.

    Rate this question:

  • 17. 

    The hotspot feature can be used only on Ethernet interfaces. You have to use a separate access point if you want to use this feature with wireless.

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    The explanation for the given correct answer is that the hotspot feature is not limited to only Ethernet interfaces. It can also be used with wireless interfaces. Therefore, the statement that a separate access point is required for using the hotspot feature with wireless is incorrect.

    Rate this question:

  • 18. 

    If you need to make sure that one computer in your Hotspot network can access the internet without Hotspot authentication, which menu allows you to do this?

    • A.

      Users

    • B.

      IP bindings

    • C.

      Walled-garden

    • D.

      Walled-garden IP

    Correct Answer
    B. IP bindings
    Explanation
    The correct answer is IP bindings. In a Hotspot network, IP bindings allow you to specify certain IP addresses that can bypass the Hotspot authentication and directly access the internet. By adding the IP address of the specific computer to the IP bindings list, you can ensure that it can access the internet without going through the authentication process. This is useful in scenarios where you need to provide unrestricted internet access to a particular device or computer within the Hotspot network.

    Rate this question:

  • 19. 

    How many different priorities can be selected for queues in Mikrotik RouterOS?

    • A.

      8

    • B.

      16

    • C.

      0

    • D.

      1

    Correct Answer
    A. 8
    Explanation
    In Mikrotik RouterOS, there are 8 different priorities that can be selected for queues. This means that when setting up queues for managing network traffic, there are 8 different priority levels available to assign to each queue. These priority levels help determine the order in which packets are processed and ensure that higher-priority traffic gets processed before lower-priority traffic.

    Rate this question:

  • 20. 

    Which default route will be active? /ip route add disabled=no distance=10 dst-address=0.0.0.0/0 gateway=1.1.1.1 add disabled=no distance=5 dst-address=0.0.0.0/0 gateway=2.2.2.2

    • A.

      Route via gateway 1.1.1.1

    • B.

      Route via gateway 2.2.2.2

    • C.

      Route via gateway 1.0.1.1

    • D.

      None of the above

    Correct Answer
    B. Route via gateway 2.2.2.2
    Explanation
    The default route that will be active is the one with a lower distance value. In this case, the route with a distance of 5 (via gateway 2.2.2.2) has a lower distance value than the route with a distance of 10 (via gateway 1.1.1.1). Therefore, the route via gateway 2.2.2.2 will be active.

    Rate this question:

  • 21. 

    How long is a level 1 (demo) license valid?

    • A.

      24 hours

    • B.

      Infinite time

    • C.

      1 month

    • D.

      1 year

    • E.

      12 hours

    Correct Answer
    A. 24 hours
    Explanation
    A level 1 (demo) license in MikroTik RouterOS is valid for 24 hours. After installation, RouterOS runs in trial mode. You have 24 hours to register for Level 1 (Free demo), purchase a Level 4, 5, or 6 license, and paste a valid key. After the trial period, a valid key must be entered to continue using the system.

    Rate this question:

  • 22. 

    Nstreme works only on 40mhz Channel width.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Nstreme is a proprietary wireless protocol developed by MikroTik. It is designed to improve the performance and efficiency of wireless communication. Nstreme can work on various channel widths, including 20MHz, 40MHz, and even higher. Therefore, the statement that Nstreme works only on a 40MHz channel width is incorrect.

    Rate this question:

  • 23. 

    To make all DNS requests coming from your network to resolve on your router (regardless of client configuration), which action would you specify for the DST-NAT rule?

    • A.

      Masquerade

    • B.

      Dst-nat

    • C.

      You can't use DST-NAT to achieve this

    • D.

      Redirect

    Correct Answer
    D. Redirect
    Explanation
    The correct answer is "redirect." When you specify the "redirect" action for the DST-NAT rule, it will redirect all DNS requests originating from your network to resolve on your router, regardless of the clients' configurations. This ensures that all DNS traffic is directed to the router for resolution, allowing for centralized control and management of DNS requests within the network. Masquerade, on the other hand, is used for network address translation (NAT), and DST-NAT cannot achieve this objective.

    Rate this question:

  • 24. 

    The first two rules in the forward chain of the filter table are : /ip firewall filter add chain=forward connection-state=established action=accept /ip firewall filter add chain=forward connection-state=invalid action=drop connection-state=related packets are not filtered by the rules above.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The first rule in the forward chain of the filter table accepts packets with a connection state of “established,” and the second rule drops packets with a connection state of “invalid.” However, packets with a connection state of “related” are also accepted by the first rule. This is because the “established” and “related” states are often grouped together in firewall rules. So, packets with a connection state of “related” are indeed filtered by the rules above.

    Rate this question:

  • 25. 

    "/interface wireless access list" is used for

    • A.

      Shows a list of Client's MAC address that are already registered at AP

    • B.

      Authenticate Hotspot users

    • C.

      Handles a list of Client's MAC Address to permit/deny connection to AP

    • D.

      Contains the security profiles settings

    Correct Answer
    C. Handles a list of Client's MAC Address to permit/deny connection to AP
    Explanation
    The "/interface wireless access list" command is used to manage a list of MAC addresses that are allowed or denied access to a wireless access point (AP). This list can be used to control which clients are allowed to connect to the AP based on their MAC addresses. This helps enhance network security and manage the devices that are permitted to use the wireless network.

    Rate this question:

  • 26. 

    In case when router login password is lost, it is necessary to reinstall RouterOS or use hardware reset function.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When the router login password is lost, reinstalling RouterOS or using the hardware reset function is necessary. This is because the login password is a security measure to prevent unauthorized access to the router's settings and configuration. If the password is lost, reinstalling the operating system or performing a hardware reset will reset all settings and configurations, including the password, allowing the user to regain access to the router.

    Rate this question:

  • 27. 

    Possible actions of IP firewall filter are:

    • A.

      Tarpit

    • B.

      Tarp

    • C.

      Bounce

    • D.

      Add-to-address-list

    • E.

      Log

    • F.

      Accept

    Correct Answer(s)
    A. Tarpit
    D. Add-to-address-list
    E. Log
    F. Accept
    Explanation
    The possible actions of IP firewall filter include tarpit, which slows down the connection to prevent malicious attacks, add-to-address-list, which adds the source IP address to a specified address list, log, which records information about the connection, and accept, which allows the connection to pass through the firewall. These actions help in enhancing the security and control of network traffic.

    Rate this question:

  • 28. 

    Which software version can be installed onto the following RouterBoard types?

    • A.

      Routeros-x86-x.xx.npk on a RB1100

    • B.

      Routeros-mipsbe-x.xx.npk on a RB133

    • C.

      Routeros-mipsle-x.xx.npk on a RB133

    • D.

      Routeros-powerpc-x.xx.npk on a RB333

    • E.

      Routeros-mipsbe-x.xx.npk on a RB433

    Correct Answer(s)
    A. Routeros-x86-x.xx.npk on a RB1100
    C. Routeros-mipsle-x.xx.npk on a RB133
    E. Routeros-mipsbe-x.xx.npk on a RB433
    Explanation
    The given answer states that the software version "routeros-mipsle-x.xx.npk" can be installed on a RB133 router, and the software version "routeros-mipsbe-x.xx.npk" can be installed on a RB433 router. It implies that different RouterBoard types require different software versions for installation. The "mipsle" and "mipsbe" in the software version names refer to different processor architectures, and each RouterBoard type has a specific processor architecture. Therefore, it is important to choose the correct software version that matches the processor architecture of the RouterBoard type for successful installation.

    Rate this question:

  • 29. 

    PPP Secrets are used for:

    • A.

      L2TP clients

    • B.

      Router users

    • C.

      PPTP clients

    • D.

      PPP clients

    • E.

      IPSec clients

    • F.

      PPPoE clients

    Correct Answer(s)
    A. L2TP clients
    C. PPTP clients
    D. PPP clients
    F. PPPoE clients
    Explanation
    PPP Secrets are used for authenticating and authorizing clients who use various PPP-based protocols such as L2TP, PPTP, PPP, and PPPoE. These secrets contain the necessary information (username, password, and other credentials) to verify the identity of the clients and allow them access to the network. Therefore, the correct answer includes L2TP clients, PPTP clients, PPP clients, and PPPoE clients.

    Rate this question:

  • 30. 

    WPA 2 Pre Shared key (PSK) is enabled on AP, all your clients have to use the same PSK. Only Virtual AP could be used to allow clients to connect with a different PSK.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because WPA2-PSK allows each client to have a unique pre-shared key. The pre-shared key is used to authenticate and encrypt the communication between the client and the access point. Virtual APs can be used to create multiple networks with different security settings, but it is not necessary to use them in order to have different pre-shared keys for clients.

    Rate this question:

  • 31. 

    Which of the following actions are available for '/IP firewall mangle' (select all valid actions)

    • A.

      Change MSS

    • B.

      Mark connection

    • C.

      Accept

    • D.

      Jump

    • E.

      Drop

    • F.

      Mark packet

    Correct Answer(s)
    A. Change MSS
    B. Mark connection
    C. Accept
    D. Jump
    F. Mark packet
    Explanation
    The '/IP firewall mangle' table in MikroTik RouterOS allows for various actions to be performed on packets. The available actions in this case are: Change MSS (Maximum Segment Size), which modifies the TCP MSS value in the TCP SYN packet; mark connection, which marks the connection for further processing; accept, which allows the packet to pass through; jump, which jumps to a different chain for further processing; and mark packet, which marks the packet for further processing. The action drop is not available in this context.

    Rate this question:

  • 32. 

    You need to set up an E1(T1) connection with PPP configured. Which License Level is needed?

    • A.

      Level 4

    • B.

      It cannot be done in RouterOS

    • C.

      Level 5

    • D.

      Level 2

    Correct Answer
    C. Level 5
    Explanation
    The correct answer is CLevel 51. To set up an E1(T1) connection with PPP configured in MikroTik RouterOS, you need a license of at least Level 51. This is because Level 5 allows up to 500 interfaces, which is sufficient for most E1(T1) configurations. Please note that this information is based on the MikroTik RouterOS. Other systems may have different requirements.

    Rate this question:

  • 33. 

    You have a router with configuration -Public IP :202.168.125.45/24 -Default Gateway :202.1687.125.1 -DNS Server :248.115.148.136, 248.115.148.137 -Local IP :192.168.2.1/24 Mark the connection configuration on client PC to access the internet.

    • A.

      IP:192.168.2.115/24 gateway:192.168.2.1

    • B.

      IP:192.168.0.1/24 gateway:192.168.2.1

    • C.

      IP:192.168.1.223/24 gateway:248.115.148.136

    • D.

      IP:192.168.2.253/24 gateway:202.168.0.1

    Correct Answer
    A. IP:192.168.2.115/24 gateway:192.168.2.1
    Explanation
    The correct answer is IP:192.168.2.115/24 gateway:192.168.2.1. This is the correct configuration because the client PC should have an IP address in the same subnet as the router's local IP address, which is 192.168.2.1/24. The gateway should also be set to the IP address of the router, which is 192.168.2.1. This configuration allows the client PC to communicate with the router and access the internet.

    Rate this question:

  • 34. 

    An IP address pool can contain address from more than one subnet.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An IP address pool is a range of IP addresses that are available for assignment to devices on a network. It is possible for an IP address pool to contain addresses from more than one subnet. This allows for greater flexibility in assigning IP addresses to devices, as different subnets can have different ranges of IP addresses.

    Rate this question:

  • 35. 

    Which features are removed when advanced tools packages are uninstalled?

    • A.

      Neighbors

    • B.

      Ip-scan

    • C.

      Netwatch

    • D.

      LCD support

    • E.

      Ping

    • F.

      Bandwith-test

    Correct Answer(s)
    B. Ip-scan
    C. Netwatch
    E. Ping
    Explanation
    The correct answers are - ip-scan, netwatch, ping

    Rate this question:

  • 36. 

    Rate Flapping can be avoided by:

    • A.

      Choose larger channels (40 Mhz instead of 20 Mhz)

    • B.

      Reduce supported rates

    • C.

      Change ap-bridge to bridge

    • D.

      Set basic rates to only one data rate like 24 Mbps

    Correct Answer
    B. Reduce supported rates
    Explanation
    Reducing the supported rates can help avoid rate flapping. Rate flapping occurs when the wireless device constantly switches between different data rates, causing instability and poor performance. By reducing the supported rates, the device will have fewer options to choose from, reducing the chances of rate flapping. This can help maintain a more stable and reliable connection.

    Rate this question:

  • 37. 

    Mark possible connection states in the connection tracking table:

    • A.

      Related

    • B.

      Invalid

    • C.

      Closed

    • D.

      Established

    • E.

      Syn

    • F.

      New

    Correct Answer(s)
    A. Related
    B. Invalid
    D. Established
    F. New
    Explanation
    The connection tracking table is used to keep track of the state of network connections. The "Related" state indicates that the connection is related to another connection that is already established. The "Invalid" state indicates that the connection is not valid or has been terminated. The "Established" state indicates that the connection has been successfully established. The "New" state indicates that a new connection has been initiated. Therefore, the possible connection states in the connection tracking table are "Related", "Invalid", "Established", and "New".

    Rate this question:

  • 38. 

    It is impossible to delete admin user on user table MikroTik.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. It is possible to delete the admin user on the user table of MikroTik. The user table in MikroTik allows for the management of user accounts, including the ability to delete them. Therefore, the statement is incorrect.

    Rate this question:

  • 39. 

    Which options should be used when you want to prevent access from one specific address to your router web interface?

    • A.

      Group setting for System users

    • B.

      Firewall Filter Chain Input

    • C.

      Firewall Filter Chain Forward

    • D.

      WWW service from IP Services

    Correct Answer
    B. Firewall Filter Chain Input
    Explanation
    The correct answer is "Firewall Filter Chain Input." This option should be used when you want to prevent access from one specific address to your router web interface. The Firewall Filter Chain Input is responsible for filtering incoming traffic to the router, and by configuring it, you can block access from a specific IP address to the router's web interface.

    Rate this question:

  • 40. 

    Which is a default baud-rate of currently manufactured RouterBOARDs?

    • A.

      115200

    • B.

      8291

    • C.

      11520

    • D.

      3128

    Correct Answer
    A. 115200
    Explanation
    The default baud-rate of currently manufactured RouterBOARDs is 115200.

    Rate this question:

  • 41. 

    Which queue type suits the congested environment but is not functional on UDP?

    • A.

      PCQ

    • B.

      BFIFO

    • C.

      PFIFO

    • D.

      RED

    • E.

      SCQ

    Correct Answer
    D. RED
    Explanation
    RED (Random Early Detection) is a queue type that is suitable for congested environments. It helps to prevent network congestion by randomly dropping packets before the network becomes overloaded. However, RED is not functional on UDP (User Datagram Protocol) because it relies on TCP (Transmission Control Protocol) to provide feedback about congestion. Since UDP does not have a built-in congestion control mechanism like TCP, RED cannot effectively operate on UDP.

    Rate this question:

Godwin Iheuwa |MS, Computer Science |
Computer Expert
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 04, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Oct 27, 2014
    Quiz Created by
    Yosep Tri
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.