1.
RouterOS Mikrotik versi x86 adalah versi mikrotik yang hanya dapat digunakan pada perangkat...
Correct Answer
A. Komputer / PC
Explanation
The correct answer is "Komputer / PC". RouterOS Mikrotik versi x86 is a version of Mikrotik that can only be used on computer or PC devices. It is not compatible with Routerboard, Router Wireless, or Wireless Outdoor devices.
2.
Berikut ini, yang tidak termasuk package aplikasi pada mikrotik adalah...
Correct Answer
D. Mipsbe
Explanation
The given options are system, hotspot, dhcp, and mipsbe. Among these options, mipsbe is not a package application on MikroTik. The other options, system, hotspot, and dhcp, are all package applications that are commonly used in MikroTik routers.
3.
Opsi yang perlu di pilih ketika ingin menonaktifkan sebuah package pada mikrotik dapat dilakukan dengan cara melakukan klik pada tombol ......
Correct Answer
A. Disable
Explanation
When you want to disable a package on MikroTik, you need to click on the "disable" button. This action will deactivate the package and prevent it from functioning or running on the device.
4.
Model arsitektural jaringan komputer yang dikembangkan sebagai standar komunikasi data dalam jaringan komputer
Correct Answer
A. OSI
Explanation
The OSI (Open Systems Interconnection) model is an architectural model for computer networks that was developed as a standard for data communication in computer networks. It is a conceptual framework that defines a set of protocols and standards to enable different computer systems to communicate with each other. The OSI model consists of seven layers, each responsible for a specific aspect of network communication. It provides a standardized approach to network communication, allowing for interoperability between different network devices and systems.
5.
Pada dasarnya sebuah router berfungsi untuk menghubungkan network yang memiliki ip address yang berbeda, router beroperasi pada layer ke......
Correct Answer
B. Network
Explanation
A router functions to connect networks with different IP addresses, allowing them to communicate with each other. This implies that a router operates at the network layer.
6.
Bit-bit yang dikelompok menjadi frame-frame untuk selanjutnya diproses pada layer selanjutnya, proses ini dikenal dengan framming, proses tersebut berjalan pada layer ke...
Correct Answer
A. Data Link
Explanation
The process of grouping bits into frames for further processing at the next layer is known as framing. This process occurs at the Data Link layer.
7.
Layer OSI yang bertugas untuk membentuk koneksi, kemudian memutuskannya ketika seluruh data telah terkirim atau diterima adalah...
Correct Answer
A. Layer 5 Session
Explanation
Layer 5 Session is responsible for establishing and terminating connections between two devices. It manages the session between the sender and receiver by initiating, coordinating, and terminating the communication. This layer ensures that all the data has been successfully transmitted and received before terminating the session. It also handles synchronization, checkpointing, and recovery of the session in case of any interruptions or errors during the transmission.
8.
Sebuah header paket data yang diberikan untuk selanjutnya dilakukan proses framming ke layer selanjutnya untuk di transmisikan melalui media transmisi kabel, header paket data tersebut berisi beberapa informasi diantaranya...
Correct Answer
C. Source Address & Destination Address
Explanation
The correct answer is "Source Address & Destination Address". The header packet contains information about the source address, which is the address of the sender, and the destination address, which is the address of the receiver. These addresses are used to ensure that the packet is delivered to the correct destination.
9.
Berikut ini yang tidak termasuk dalam jenis alamat MAC Address pada jaringan adalah...
Correct Answer
B. 91:F5:G8:E7:55:40
10.
Pembagian sebuah network address, menjadi kelompok-kelompok network yang lebih kecil, hal ini bertujuan untuk membagi dan mengelompokkan host ke kelompok yang lebih spesifik, hal tersebut dikenal dengan istilah...
Correct Answer
A. Subnet
Explanation
The given correct answer is "Subnet". When a network address is divided into smaller groups, it is known as subnetting. Subnetting allows for the division and grouping of hosts into more specific subgroups within a network. This helps in efficient management and allocation of IP addresses, as well as improving network performance and security. Subnetting is an essential concept in networking and is commonly used in various network architectures.
11.
Berapakah jumlah host dari network address berikut....192.168.1.64/27
Correct Answer
B. 30
Explanation
The given network address is 192.168.1.64/27. The "/27" indicates that the first 27 bits of the IP address are the network address and the remaining 5 bits are used for host addresses. In binary, the last 5 bits are 00000. Therefore, there are 2^5 (32) possible combinations for the host addresses. However, the first and last combinations are reserved for the network address and broadcast address respectively, leaving 30 possible host addresses.
12.
Berikut ini adalah protocol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, TELNET, untuk berkomunikasi adalah...
Correct Answer
A. TCP
Explanation
TCP (Transmission Control Protocol) adalah protokol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, dan TELNET untuk berkomunikasi. TCP adalah protokol yang handal dan terjamin pengiriman datanya. Protokol ini menggunakan pendekatan dengan mengatur aliran data, memastikan bahwa data dikirim dengan urutan yang benar, dan melakukan pemeriksaan kesalahan untuk memastikan keintegritasan data. Dalam konteks ini, TCP adalah protokol yang paling sesuai untuk digunakan oleh aplikasi-aplikasi tersebut.
13.
Berikut ini adalah yang termasuk sebagai port default aplikasi winbox adalah....
Correct Answer
A. 8291
Explanation
The correct answer is 8291 because it is listed as one of the options for default winbox application ports.
14.
Service apakah berikut ini yang menggunakan protocol TCP dan menggunakan port 161
Correct Answer
A. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) is the correct answer. SMTP is a service that uses the TCP protocol and port 161 is not associated with SMTP, but rather with SNMP (Simple Network Management Protocol). NTP (Network Time Protocol) uses port 123 and POP3 (Post Office Protocol version 3) uses port 110. Therefore, the correct answer is SMTP.
15.
Service yang menggunakan protocol UDP dan port 53 sebagai media komunikasi adalah...
Correct Answer
A. DNS
Explanation
DNS (Domain Name System) is a service that translates domain names into IP addresses and vice versa. It uses the User Datagram Protocol (UDP) as the transport protocol and port 53 as the communication medium. UDP is a connectionless protocol that provides faster communication but does not guarantee the delivery of data. DNS uses UDP to efficiently resolve domain names to IP addresses without the need for establishing a connection. Therefore, DNS is the correct answer as it uses UDP and port 53 for communication.
16.
Perbedaan mendasar aplikasi remote access Telnet dan SSH adalah terletak pada aspek...........
Correct Answer
A. Keamanan
Explanation
The fundamental difference between Telnet and SSH remote access applications lies in their security aspect. Telnet is an insecure protocol that transmits data in plaintext, making it vulnerable to eavesdropping and unauthorized access. On the other hand, SSH (Secure Shell) is a secure protocol that encrypts data during transmission, ensuring confidentiality and integrity. Therefore, the correct answer is "Keamanan" (Security).
17.
Untuk mengakses sebuah mikrotik melalui jalur Webfig maka kita membutuhkan aplikasi......
Correct Answer
C. Web Browser
Explanation
To access a MikroTik device through Webfig, we need a web browser. Webfig is a web-based configuration interface provided by MikroTik that allows users to configure and manage their MikroTik devices using a graphical user interface (GUI) accessed through a web browser. Therefore, using a web browser is the correct option for accessing a MikroTik device via Webfig.
18.
Konfigurasi default sebuah mikrotik adalah sebagai berikut :ether 1 : dhcp clientbridge 1 : ether2-ether3-ether4-ether5,dstip address bridge : ????????dhcp server : bridge1NAT = yesBerapakah ip address interface bridge pada konfigurasi default ???
Correct Answer
A. 192.168.88.1/24
Explanation
The correct answer is 192.168.88.1/24. This is because in the given default configuration, the IP address of the bridge interface is set to 192.168.88.1 with a subnet mask of /24. This means that the bridge interface will have an IP address of 192.168.88.1 and can communicate with devices within the same subnet range of 192.168.88.0/24.
19.
Untuk mengkonfigurasi layanan remote access dan port pada sebuah mikrotik, jika ingin mengubah port 80:www menjadi port 81:www, maka perintahnya adalah ???
Correct Answer
A. > ip service set www port=81
Explanation
The correct answer is "> ip service set www port=81". This command is used to configure the remote access and port on a MikroTik device. By using this command, the port for the www service is changed from 80 to 81.
20.
Cara paling mudah untk mengkonfigurasi sebuah perangkat mikrotik routerboard adalah dengan menggunakan....
Correct Answer
B. Winbox
Explanation
The easiest way to configure a Mikrotik routerboard is by using Winbox. Winbox is a graphical user interface (GUI) tool provided by Mikrotik that allows users to configure and manage their routerboards. It provides a user-friendly interface with various options and settings, making it convenient for users to configure their devices without the need for complex command-line configurations.
21.
Menginstall mikrotik router OS di PC dapat dilakukan dengan menggunakan cdrom, jenis routeros yang harus digunakan adalah....
Correct Answer
D. Routeros-x86
Explanation
To install MikroTik RouterOS on a PC using a CD-ROM, the appropriate type of RouterOS to be used is "routeros-x86". This version is specifically designed for x86 architecture, which is commonly used in personal computers. The other options mentioned (routeros-mipsbe, routeros-smips, routeros-ppc) are designed for different hardware architectures and are not suitable for installation on a PC.
22.
Untuk melakukan installasi mikrotik routeros pada routerboard dapat menggunakan aplikasi netinstall, aplikasi lainnya yang dibutuhkan adalah....
Correct Answer
A. Routeros
Explanation
To perform the installation of MikroTik RouterOS on a RouterBoard, the required application is RouterOS. This is because RouterOS is the operating system developed by MikroTik specifically for their RouterBoard devices. It is necessary to have RouterOS in order to install and run the MikroTik RouterOS software on the RouterBoard.
23.
Untuk mengakses mikrotik dalam mode teks menggunakan fitur SSH / Telnet, maka kita memerlukan aplikasi client seperti puTTY dan lainnya, hal selanjutnya yang diperlu diketahui sebelum dilakukan proses remote adalah....
Correct Answer
A. IP Address
Explanation
Before performing remote access using SSH/Telnet, one important thing to know is the IP Address. The IP Address is a unique identifier assigned to each device on a network. It is necessary to know the IP Address of the MikroTik device in order to establish a connection using a client application like puTTY. The IP Address allows the client application to locate and connect to the specific MikroTik device over the network.
24.
Perkembangan mikrotik saat ini semakin pesat, mikrotik dapat berperan menjadi perangkat apa saja dalam jaringan mulai dari router, bridge, switch, access point, cpe, server, dllberikut ini adalah fitur server pada mikrotik adalah...
Correct Answer
D. Hotspot Radius
Explanation
The correct answer is Hotspot Radius. Mikrotik can function as a server for Hotspot Radius, which allows for authentication, authorization, and accounting for users accessing the network. This feature is commonly used in public Wi-Fi networks, where users need to log in or provide credentials to access the internet. The Hotspot Radius server in Mikrotik helps manage and control user access, bandwidth usage, and other network policies for a secure and efficient network experience.
25.
Parameter pada Firewall yang berfungsi untuk membuat / mengelompokkan beberapa alamat ip address kedalam suatu kelompok, sehingga mempermudah dalam proses pengolahannya adalah fitur yang dikenal dengan
Correct Answer
A. Address List
Explanation
The parameter in a firewall that allows for the creation or grouping of multiple IP addresses into a single list is known as an Address List. This feature simplifies the processing of these addresses and enables easier management and configuration of firewall rules.
26.
Perbedaan mendasar antara chain pada NAT adalah srcnat dan dstnat, fitur yang berfungsi untuk mengubah akses koneksi dari jaringan publik ke jaringan lokal
Correct Answer
A. Dstnat
Explanation
The correct answer is dstnat. The fundamental difference between srcnat and dstnat in NAT chains is that dstnat is a feature that is used to change the access connection from a public network to a local network. This means that dstnat is responsible for modifying the destination IP address of incoming packets to redirect them to a specific host or server in the local network. On the other hand, srcnat is used to modify the source IP address of outgoing packets, allowing them to appear as if they originated from a different IP address.
27.
Action pada nat apakah yang berfungsi : menciptakan pemetaan 1:1 statis dari satu set alamat IP satu sama lain. Sering digunakan untuk mendistribusikan alamat IP publik untuk host di jaringan pribadi,
Correct Answer
D. Netmap
Explanation
The action "netmap" is used to create a static one-to-one mapping of IP addresses from one set to another. It is often used to distribute public IP addresses to hosts in a private network.
28.
Action NAT yang berfungsi apabila LAN memiliki prefix yang berbeda dengan prefik pada IP Public. Misal, IP LAN memiliki prefik /24 dan akan di NAT ke IP Public dengan prefik /27. Pada saat awal koneksi, IP LAN akan diubah ke IP Public secara acak.​
Correct Answer
A. Same
Explanation
The correct answer is "same". This is because the action NAT mentioned in the question refers to Network Address Translation, which is used to translate private IP addresses to public IP addresses. In this scenario, the LAN has a different prefix (/24) compared to the public IP (/27). The "same" action in NAT means that the translated IP address will have the same prefix as the LAN IP address. Therefore, the LAN IP will be randomly changed to a public IP with a /24 prefix.
29.
Manajemen bandwidth yang bekerja dengan sebuah algoritma yang akan membagi bandwidth secara merata ke sejumlah client yang aktif, manajemen bandwidth ini dikenal dengan ...
Correct Answer
A. PCQ
Explanation
PCQ stands for Per Connection Queue. It is a bandwidth management algorithm that evenly distributes bandwidth among active clients. PCQ ensures fair allocation of bandwidth by assigning a specific amount of bandwidth to each connection, regardless of the number of clients. This allows for better control and optimization of network resources, ensuring an efficient and equitable distribution of bandwidth for all users.
30.
Istilah yang sering digunakan untuk menentukkan minimum garansi kecepatan yang dapat diterima oleh client ketika koneksi sedang sibuk / trafik sedang tinggi...
Correct Answer
A. Commited information Rate
Explanation
The term commonly used to determine the minimum guaranteed speed acceptable to the client when the connection is busy or traffic is high is "Commited information Rate" (CIR). CIR represents the minimum bandwidth or data rate that the service provider guarantees to deliver to the client under normal network conditions. It ensures that the client will always have a certain level of performance, even during peak usage times.
31.
Jika di perhatikan ada perubahan warna pada icon Queue rule. maksud queue rule warna merah adalah...
Correct Answer
D. Pemakaian bandwidth 76-100%
Explanation
The red color of the Queue rule icon indicates that the bandwidth usage is between 76% and 100%.
32.
Menu apakah pada mikrotik yang berfungsi untuk menampilkan informasi log ???
Correct Answer
A. Log
Explanation
The correct answer is "Log". This menu on MikroTik is specifically designed to display information logs. It allows users to view and analyze system logs, service logs, and logging configurations. By accessing this menu, users can monitor and troubleshoot network issues by examining the log entries and identifying any errors or warnings that may have occurred.
33.
Reset konfigurasi dan aplikasi mikrotik dapat dilakukan dengan 3 cara yaitu (kecuali)
Correct Answer
D. Flashing
Explanation
Flashing is not a method for resetting the configuration and applications on a MikroTik device. Hard reset, soft reset, and net install are the valid methods for resetting the configuration and applications. Flashing refers to the process of updating or reinstalling the firmware on a device, but it does not specifically reset the configuration and applications.
34.
Ketika melakukan reset konfigurasi mikrotik, routerboard akan di reboot, setelah proses reboot, berapakah ip address ether1 ???
Correct Answer
B. Dynamic
Explanation
When performing a reset of the MikroTik configuration, the routerboard will be rebooted. After the reboot process, the IP address assigned to ether1 will be dynamic.
35.
Ketika melakukan reset konfigurasi mikrotik, routerboard akan di reboot, setelah proses reboot, apakah seluruh konfigurasi dan file terhapus ?
Correct Answer
B. Tidak
Explanation
Ketika melakukan reset konfigurasi mikrotik, routerboard tidak akan menghapus seluruh konfigurasi dan file. Reset konfigurasi hanya akan mengembalikan pengaturan konfigurasi ke pengaturan awal pabrik, tetapi tidak akan menghapus file atau data yang ada di routerboard.
36.
Berikut ini, apakah opsi konfigurasi yang tidak terdapat pada menu konfigurasi System > Reset Configuration...
Correct Answer
D. Backup Configuration before Reset
Explanation
The correct answer is "Backup Configuration before Reset". This option allows users to create a backup of the current configuration settings before performing a reset. This ensures that any important configurations are saved and can be easily restored after the reset. The other options mentioned in the question are all available in the "System > Reset Configuration" menu.
37.
Sebelum melakukan proses netinstall pada mikrotik, konfigurasi apakah yang perlu kita lakukan ???
Correct Answer
C. Melakukan konfigurasi Netbooting
Explanation
Before performing a netinstall process on Mikrotik, the necessary configuration to be done is configuring Netbooting. This involves setting up the network boot server and configuring the necessary settings on the Mikrotik device to enable it to boot from the network. Netbooting allows the Mikrotik device to load the necessary files and software needed for the netinstall process from a network server instead of using local storage.
38.
Pada menu apakah jika kita ingin melakukan konfigurasi Identity pada router mikrotik ???
Correct Answer
B. System > Identity
Explanation
To configure the Identity on a MikroTik router, you need to go to the "System > Identity" menu. This menu allows you to set the name of the router, which is used for identification purposes. By accessing this menu, you can easily configure and change the identity of the router according to your requirements.
39.
Pada menu/bagian apakah berikut ini yang tidak ditampilkan informasi identity routerboard ???
Correct Answer
D. Start Menu Browser
Explanation
The Start Menu Browser does not display information about the identity routerboard.
40.
Proses pengaksesan mikrotik ke router berdasarkan pengaturan user dan group, user dan group mikrotik dapat ditentukkan melalui menu...
Correct Answer
A. System > User
Explanation
The correct answer is "System > User". In Mikrotik, the process of accessing the router is based on the settings of user and group. These user and group settings can be determined through the System > User menu. This menu allows users to be created, edited, and managed, along with assigning them to specific groups with different levels of access and permissions.
41.
Untuk mengecek user yang sedang login ke mikrotik melalui winbox, ssh, dan webfig dapat diakses melalui menu......
Correct Answer
B. System > Users> Active Users
Explanation
The correct answer is "System > Users > Active Users". This menu option allows the user to check the active users who are currently logged in to the Mikrotik router through winbox, ssh, and webfig. By accessing this menu, the user can view the list of active users and their respective login information.
42.
User dalam mikrotik dikategorikan kedalam beberapa group sesuai hak aksesnya, berikut ini yang tidak termasuk group user tersebut adalah....
Correct Answer
D. Root
Explanation
The given options are Read, Write, Full, and Root. The question is asking which one does not belong to the group of user categories in MikroTik. The correct answer is "Root" because it is not a user category in MikroTik. Root is a term commonly used in Linux systems to refer to the superuser or administrator with full control over the system, but it is not a specific user category in MikroTik's user management system.
43.
Apakah perbedaan antara user dengan akses write dan full pada mikrotik ???
Correct Answer
B. Full memiliki hak akses penuh dalam system, dan Write hanya tidak bisa melakukan reboot, dan penambahan user baru
Explanation
The answer states that the difference between a user with write access and a user with full access on MikroTik is that the user with full access has complete rights within the system, while the user with write access is restricted from performing reboot and adding new users.
44.
Jika kita ingin membuat sebuah user pada mikrotik yang hanya bisa diakses melalui ip address tertentu, opsi apakah yang harus kita konfigurasi ???
Correct Answer
B. Allowed Address
Explanation
The correct answer is "Allowed Address." When creating a user on Mikrotik, if we want to restrict access to only a specific IP address, we need to configure the "Allowed Address" option. This allows us to specify the IP address that the user is allowed to access the Mikrotik device from. By configuring this option, we can ensure that the user can only connect to the device from the specified IP address and restrict access from other IP addresses.
45.
Jika kita ingin menkonfigurasi service dan port winbox dapat mengakses melalui menu IP > Services, namun jika kita hanya ingin mengaktifkan sebuah service khusus untuk ip address tertentu saja, maka opsi yang harus kita konfigurasi adalah....
Correct Answer
A. Available From
Explanation
The correct answer is "Available From". This option allows us to specify the IP address or range of IP addresses that are allowed to access the service. By configuring the "Available From" option, we can restrict access to the Winbox service to only a specific IP address or a range of IP addresses, ensuring that only authorized users can access the service.
46.
Protocol mikrotik yang berfungsi untuk memudahkan konfigurasi dan manajemen jaringan, juga memungkinkan setiap router mikrotik untuk menemukan router mikrotik menggunakan winbox, protocol ini dikenal dengan adalah....
Correct Answer
A. Mikrotik Neighbor Discovery Protocol
Explanation
The correct answer is Mikrotik Neighbor Discovery Protocol. This protocol is used to facilitate the configuration and management of networks in Mikrotik routers. It allows each Mikrotik router to discover other Mikrotik routers using winbox.
47.
Hasil dari proses backup mikrotik yang terenkripsi dan hanya bisa di restore pada mikrotik yang menggunakan model dan tipe yang serupa adalah menggunakan ekstensi...
Correct Answer
D. .backup
Explanation
The correct answer is ".backup". When MikroTik backups are encrypted, they can only be restored on MikroTik devices with similar models and types. The backup file extension for these encrypted backups is ".backup".
48.
Metode backup yang dapat membackup sebagian konfigurasi atau keseluruhan konfigurasi mikrotik, dapat dilakukan melalui new terminal, dengan menggunakan perintah....
Correct Answer
A. Export
Explanation
The correct answer is export. The export command in MikroTik allows for backing up either partial or complete configurations. It is used in the new terminal to export the configuration settings, which can later be imported or restored if needed. This command is useful for creating backups of the configuration settings to ensure that they can be easily recovered in case of any issues or changes.
49.
Hasil backup konfigurasi mikrotik yang dapat dibaca, dimodifikasi dan diubah menggunakan teks editor adalah menggunakan ekstensi...
Correct Answer
A. .rsc
Explanation
The correct answer is .rsc. The .rsc extension is used for backup files of MikroTik router configurations that can be easily read, modified, and changed using a text editor.
50.
Proses backup dan restore, dapat dilakukan melalui storage yang tersimpan pada memori mikrotik, menu ini dapat diakses melalui...
Correct Answer
A. File
Explanation
The correct answer is "File" because the question is asking about the process of backup and restore, which can be done through the storage stored in the memory of the MikroTik. This suggests that the option "File" is the most appropriate choice as it refers to accessing the menu for backup and restore through files stored in the memory.