Soal Latihan - Olimpiade Jaringan MikroTik Smk 2017

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Walidtkj
W
Walidtkj
Community Contributor
Quizzes Created: 2 | Total Attempts: 17,056
| Attempts: 16,156 | Pertanyaan: 100
Please wait...

Question 1 / 100
0 %
0/100
Score 0/100
1. Opsi yang perlu di pilih ketika ingin menonaktifkan sebuah package pada mikrotik dapat dilakukan dengan cara melakukan klik pada tombol ......

Explanation

When you want to disable a package on MikroTik, you need to click on the "disable" button. This action will deactivate the package and prevent it from functioning or running on the device.

Submit
Please wait...
About This Quiz
Soal Latihan - Olimpiade Jaringan MikroTik Smk 2017 - Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Cara paling mudah untk mengkonfigurasi sebuah perangkat mikrotik routerboard adalah dengan menggunakan....

Explanation

The easiest way to configure a Mikrotik routerboard is by using Winbox. Winbox is a graphical user interface (GUI) tool provided by Mikrotik that allows users to configure and manage their routerboards. It provides a user-friendly interface with various options and settings, making it convenient for users to configure their devices without the need for complex command-line configurations.

Submit
3. menu pada wireless untuk mengkonfigurasi pengamanan / security adalah.....

Explanation

The correct answer is "Security Profile" because in a wireless network, the security profile is used to configure and manage the security settings. It allows the user to set up encryption methods, authentication protocols, and other security measures to protect the network from unauthorized access. The security profile is essential for ensuring the confidentiality, integrity, and availability of the wireless network.

Submit
4. Pada menu apakah jika kita ingin melakukan konfigurasi Identity pada router mikrotik ???

Explanation

To configure the Identity on a MikroTik router, you need to go to the "System > Identity" menu. This menu allows you to set the name of the router, which is used for identification purposes. By accessing this menu, you can easily configure and change the identity of the router according to your requirements.

Submit
5. Berikut ini, yang tidak termasuk package aplikasi pada mikrotik adalah...

Explanation

The given options are system, hotspot, dhcp, and mipsbe. Among these options, mipsbe is not a package application on MikroTik. The other options, system, hotspot, and dhcp, are all package applications that are commonly used in MikroTik routers.

Submit
6. Menginstall mikrotik router OS di PC dapat dilakukan dengan menggunakan cdrom, jenis routeros yang harus digunakan adalah....

Explanation

To install MikroTik RouterOS on a PC using a CD-ROM, the appropriate type of RouterOS to be used is "routeros-x86". This version is specifically designed for x86 architecture, which is commonly used in personal computers. The other options mentioned (routeros-mipsbe, routeros-smips, routeros-ppc) are designed for different hardware architectures and are not suitable for installation on a PC.

Submit
7. Perhatikan kedua baris perintah mikrotik diatas, perbedaan mendasar antara kedua baris tersebut, terletak pada....

Explanation

The fundamental difference between the two lines is that the first line "backup keseluruhan" refers to a complete backup, which includes all configurations and settings of the MikroTik device. On the other hand, the second line "backup konfigurasi ip address" specifically refers to a backup of only the IP address configurations.

Submit
8. Perbedaan mendasar aplikasi remote access Telnet dan SSH adalah terletak pada aspek...........

Explanation

The fundamental difference between Telnet and SSH remote access applications lies in their security aspect. Telnet is an insecure protocol that transmits data in plaintext, making it vulnerable to eavesdropping and unauthorized access. On the other hand, SSH (Secure Shell) is a secure protocol that encrypts data during transmission, ensuring confidentiality and integrity. Therefore, the correct answer is "Keamanan" (Security).

Submit
9. RouterOS Mikrotik versi x86 adalah versi mikrotik yang hanya dapat digunakan pada perangkat...

Explanation

The correct answer is "Komputer / PC". RouterOS Mikrotik versi x86 is a version of Mikrotik that can only be used on computer or PC devices. It is not compatible with Routerboard, Router Wireless, or Wireless Outdoor devices.

Submit
10. Pada menu apakah kita melihat informasi ip address dynamic (DHCP Client) yang diterima oleh interface DHCP ???

Explanation

The correct answer is "Status." The status menu is where we can see the information about the dynamic IP address received by the DHCP client on the interface.

Submit
11. Fitur mikrotik yang berfungsi untuk melindungi router dari akses yang tidak dikehendaki baik yang berasal dari luar internet maupun dari client (local) adalah....

Explanation

The correct answer is "Firewall". A firewall is a feature in MikroTik that helps protect the router from unwanted access, whether it is from the internet or from local clients. It acts as a barrier between the router and potential threats, filtering and controlling the network traffic based on predetermined security rules. By implementing a firewall, the router can prevent unauthorized access attempts and ensure the security of the network.

Submit
12. Proses pengaksesan mikrotik ke router berdasarkan pengaturan user dan group, user dan group mikrotik dapat ditentukkan melalui menu...

Explanation

The correct answer is "System > User". In Mikrotik, the process of accessing the router is based on the settings of user and group. These user and group settings can be determined through the System > User menu. This menu allows users to be created, edited, and managed, along with assigning them to specific groups with different levels of access and permissions.

Submit
13. Dalam melakukan setting / konfigurasi DNS Server pada mikrotik, opsi apakah yang perlu diaktifkan agar mikrotik menjadi / berperan sebagai Router DNS....

Explanation

To configure the MikroTik router as a DNS server, the "Allow Remote Request" option needs to be activated. This option allows the router to accept DNS requests from clients outside of its network. By enabling this option, the router can act as a DNS server and respond to DNS queries from devices connected to it. This is essential for the router to function as a DNS server and provide DNS resolution services to clients.

Submit
14. User dalam mikrotik dikategorikan kedalam beberapa group sesuai hak aksesnya, berikut ini yang tidak termasuk group user tersebut adalah....

Explanation

The given options are Read, Write, Full, and Root. The question is asking which one does not belong to the group of user categories in MikroTik. The correct answer is "Root" because it is not a user category in MikroTik. Root is a term commonly used in Linux systems to refer to the superuser or administrator with full control over the system, but it is not a specific user category in MikroTik's user management system.

Submit
15. Reset konfigurasi dan aplikasi mikrotik dapat dilakukan dengan 3 cara yaitu (kecuali)

Explanation

Flashing is not a method for resetting the configuration and applications on a MikroTik device. Hard reset, soft reset, and net install are the valid methods for resetting the configuration and applications. Flashing refers to the process of updating or reinstalling the firmware on a device, but it does not specifically reset the configuration and applications.

Submit
16. Apakah fungsi dan kegunaan parameter "Use Peer DNS" pada menu DHCP Client berikut....

Explanation

The "Use Peer DNS" parameter in the DHCP Client menu is used for automatic DNS configuration. When this parameter is enabled, the DHCP client will receive DNS server information from the DHCP server, allowing the client to automatically configure its DNS settings. This is useful in scenarios where the network uses dynamic IP addressing and the DNS server IP addresses may change frequently. By enabling this parameter, the client can ensure that it always has the correct DNS server information without the need for manual configuration.

Submit
17. Konfigurasi action pada NAT yang berfungsi untuk mengkonfigurasi dengan tujuan untuk mengubah ip private menjadi ip public adalah

Explanation

The correct answer is Masquerade. Masquerade is an action in NAT configuration that is used to transform private IP addresses into public IP addresses. It allows a device with a private IP address to communicate with devices on the internet using a public IP address. This is commonly used in scenarios where a network has limited public IP addresses and needs to share them among multiple devices with private IP addresses. Masquerade hides the private IP addresses and replaces them with the public IP address, enabling communication with external networks.

Submit
18. Jika router bisa ping ke ip address public (contoh : 8.8.8.8), namun tidak bisa ping ke nama domain (DNS), opsi apakah yang harus kita konfigurasi...

Explanation

If the router can ping a public IP address but cannot ping a domain name, the issue is likely with the DNS (Domain Name System) configuration. The DNS servers are responsible for resolving domain names to their corresponding IP addresses. By configuring the DNS servers correctly, the router will be able to resolve domain names and successfully ping them.

Submit
19. Proses backup dan restore, dapat dilakukan melalui storage yang tersimpan pada memori mikrotik, menu ini dapat diakses melalui...

Explanation

The correct answer is "File" because the question is asking about the process of backup and restore, which can be done through the storage stored in the memory of the MikroTik. This suggests that the option "File" is the most appropriate choice as it refers to accessing the menu for backup and restore through files stored in the memory.

Submit
20. secara default chain apakah yang termasuk pada fitur Firewall Filter Mikrotik....

Explanation

The correct answer is input, output, forward. These are the default chains included in the Firewall Filter feature of MikroTik. The input chain is used for packets destined for the router itself, the output chain is for packets originating from the router, and the forward chain is for packets passing through the router. These chains allow for filtering and controlling the flow of network traffic.

Submit
21. Berapakah jumlah host dari network address berikut....192.168.1.64/27

Explanation

The given network address is 192.168.1.64/27. The "/27" indicates that the first 27 bits of the IP address are the network address and the remaining 5 bits are used for host addresses. In binary, the last 5 bits are 00000. Therefore, there are 2^5 (32) possible combinations for the host addresses. However, the first and last combinations are reserved for the network address and broadcast address respectively, leaving 30 possible host addresses.

Submit
22. Bridge adalah sebuah fitur yang berfungsi untuk menggabungkan interface yang berbeda  kedalam 1 interface logical, Berikut ini yang termasuk kelebihan bridge adalah...

Explanation

The correct answer is "Menghemat sumber daya dan penggunaan perangkat". This is because a bridge helps to combine different interfaces into one logical interface, which reduces the need for multiple physical devices. This saves resources and reduces the overall usage of devices, leading to cost savings and improved efficiency.

Submit
23. Jika di perhatikan ada perubahan warna pada icon Queue rule. maksud queue rule warna merah adalah...

Explanation

The red color of the Queue rule icon indicates that the bandwidth usage is between 76% and 100%.

Submit
24. Model arsitektural jaringan komputer yang dikembangkan sebagai standar komunikasi data dalam jaringan komputer

Explanation

The OSI (Open Systems Interconnection) model is an architectural model for computer networks that was developed as a standard for data communication in computer networks. It is a conceptual framework that defines a set of protocols and standards to enable different computer systems to communicate with each other. The OSI model consists of seven layers, each responsible for a specific aspect of network communication. It provides a standardized approach to network communication, allowing for interoperability between different network devices and systems.

Submit
25. Untuk mengakses mikrotik dalam mode teks menggunakan fitur SSH / Telnet, maka kita memerlukan aplikasi client seperti puTTY dan lainnya, hal selanjutnya yang diperlu diketahui sebelum dilakukan proses remote adalah....

Explanation

Before performing remote access using SSH/Telnet, one important thing to know is the IP Address. The IP Address is a unique identifier assigned to each device on a network. It is necessary to know the IP Address of the MikroTik device in order to establish a connection using a client application like puTTY. The IP Address allows the client application to locate and connect to the specific MikroTik device over the network.

Submit
26. Untuk mengakses sebuah mikrotik melalui jalur Webfig maka kita membutuhkan aplikasi......

Explanation

To access a MikroTik device through Webfig, we need a web browser. Webfig is a web-based configuration interface provided by MikroTik that allows users to configure and manage their MikroTik devices using a graphical user interface (GUI) accessed through a web browser. Therefore, using a web browser is the correct option for accessing a MikroTik device via Webfig.

Submit
27. Status apakah yang ditampilkan pada status DHCP Client, ketika berhasil mendapatkan ip address dynamic.....

Explanation

The correct answer is "Bound". When a DHCP client successfully obtains a dynamic IP address, the status displayed is "Bound". This means that the client has successfully completed the DHCP lease process and has been assigned an IP address by the DHCP server.

Submit
28. Berikut ini adalah protocol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, TELNET, untuk berkomunikasi adalah...

Explanation

TCP (Transmission Control Protocol) adalah protokol yang umumnya digunakan oleh beberapa aplikasi seperti HTTP, FTP, SSH, dan TELNET untuk berkomunikasi. TCP adalah protokol yang handal dan terjamin pengiriman datanya. Protokol ini menggunakan pendekatan dengan mengatur aliran data, memastikan bahwa data dikirim dengan urutan yang benar, dan melakukan pemeriksaan kesalahan untuk memastikan keintegritasan data. Dalam konteks ini, TCP adalah protokol yang paling sesuai untuk digunakan oleh aplikasi-aplikasi tersebut.

Submit
29. Metode yang digunakan untuk menghubungkan banyak komputer ke jaringan internet dengan menggunakan satu atau lebih alamat ip adalah....

Explanation

NAT (Network Address Translation) is the method used to connect multiple computers to the internet using one or more IP addresses. It allows the translation of private IP addresses to public IP addresses, enabling multiple devices within a network to share a single public IP address. NAT is commonly used in home or office networks to conserve IP addresses and provide internet access to multiple devices simultaneously. It acts as a mediator between the local network and the internet, ensuring secure and efficient communication between them.

Submit
30. Berikut ini yang tidak termasuk dalam jenis alamat MAC Address pada jaringan adalah...

Explanation

not-available-via-ai

Submit
31. kecepatan maksimal transfer data pada standar wireless 802.11g 2.4GHz adalah....

Explanation

The maximum data transfer speed for the 802.11g wireless standard operating at 2.4GHz is 54 Mbps. This standard was introduced in 2003 and is capable of providing faster data transfer compared to the previous 802.11b standard. The 2.4GHz frequency band allows for better range but may be more susceptible to interference from other devices operating in the same frequency range.

Submit
32. Pembagian sebuah network address, menjadi kelompok-kelompok network yang lebih kecil, hal ini bertujuan untuk membagi dan mengelompokkan host ke kelompok yang lebih spesifik, hal tersebut dikenal dengan istilah...

Explanation

The given correct answer is "Subnet". When a network address is divided into smaller groups, it is known as subnetting. Subnetting allows for the division and grouping of hosts into more specific subgroups within a network. This helps in efficient management and allocation of IP addresses, as well as improving network performance and security. Subnetting is an essential concept in networking and is commonly used in various network architectures.

Submit
33. Sebuah mikrotik yang dibackup melalui menu File pada winbox, jika tidak diberi nama / identitas maka secara default akan menggunakan nama...

Explanation

When a Mikrotik device is backed up using the File menu in Winbox without specifying a name or identity, it will use the default name format "Identity - Tanggal, dan Waktu" which includes the identity (name) of the device and the date and time of the backup.

Submit
34. Fitur Walled Garden adalah fitur untuk mengizinkan pengguna untuk mengakses suatu alamat tanpa autentifikasi, action pada walled garden adalah....

Explanation

The correct answer is "allow & deny". The Walled Garden feature allows users to access a specific address without authentication. This means that users can enter the address and access its content without having to provide any login credentials. The "allow" action allows the user to access the address, while the "deny" action restricts the user from accessing it.

Submit
35. Bit-bit yang dikelompok menjadi frame-frame untuk selanjutnya diproses pada layer selanjutnya, proses ini dikenal dengan framming, proses tersebut berjalan pada layer ke...

Explanation

The process of grouping bits into frames for further processing at the next layer is known as framing. This process occurs at the Data Link layer.

Submit
36. Pada dasarnya sebuah router berfungsi untuk menghubungkan network yang memiliki ip address yang berbeda, router beroperasi pada layer ke......

Explanation

A router functions to connect networks with different IP addresses, allowing them to communicate with each other. This implies that a router operates at the network layer.

Submit
37. Paket data yang dikirim oleh client yang memiliki tujuan ke internet, dan melewati router dikenal dengan...

Explanation

The correct answer is "Forward" because when a client's data packet is sent to the internet and passes through a router, it is forwarded to its destination. The router acts as a bridge between the client and the internet, ensuring that the data reaches its intended recipient.

Submit
38. Manajemen bandwidth yang bekerja dengan sebuah algoritma yang akan membagi bandwidth secara merata ke sejumlah client yang aktif, manajemen bandwidth ini dikenal dengan ...

Explanation

PCQ stands for Per Connection Queue. It is a bandwidth management algorithm that evenly distributes bandwidth among active clients. PCQ ensures fair allocation of bandwidth by assigning a specific amount of bandwidth to each connection, regardless of the number of clients. This allows for better control and optimization of network resources, ensuring an efficient and equitable distribution of bandwidth for all users.

Submit
39. Ketika melakukan reset konfigurasi mikrotik, routerboard akan di reboot, setelah proses reboot, apakah seluruh konfigurasi dan file terhapus ?

Explanation

Ketika melakukan reset konfigurasi mikrotik, routerboard tidak akan menghapus seluruh konfigurasi dan file. Reset konfigurasi hanya akan mengembalikan pengaturan konfigurasi ke pengaturan awal pabrik, tetapi tidak akan menghapus file atau data yang ada di routerboard.

Submit
40. Berikut ini, apakah opsi konfigurasi yang tidak terdapat pada menu konfigurasi System > Reset Configuration...

Explanation

The correct answer is "Backup Configuration before Reset". This option allows users to create a backup of the current configuration settings before performing a reset. This ensures that any important configurations are saved and can be easily restored after the reset. The other options mentioned in the question are all available in the "System > Reset Configuration" menu.

Submit
41. Agar sebuah konfigurasi DHCP Client tidak mendapatkan informasi gateway secara otomatis, parameter apakah yang perlu kita konfigurasi...

Explanation

If a DHCP client does not automatically receive gateway information, the parameter that needs to be configured is "Add Default Route = no". This means that the client will not add a default route to its routing table automatically.

Submit
42. Teknik yang digunakan untuk memperluas jaringan dari access point tanpa menggunakan kabel seperti yang biasa dilakukan jaringan dengan kabel, sehingga seluruh perangkat wireless dapat saling terhubung dan berkomunikasi adalah teknik yang dikenal dengan

Explanation

The correct answer is Wireless Distribution System. This is a technique used to expand a network from an access point without using cables, allowing all wireless devices to connect and communicate with each other.

Submit
43. Untuk melakukan installasi mikrotik routeros pada routerboard dapat menggunakan aplikasi netinstall, aplikasi lainnya yang dibutuhkan adalah....

Explanation

To perform the installation of MikroTik RouterOS on a RouterBoard, the required application is RouterOS. This is because RouterOS is the operating system developed by MikroTik specifically for their RouterBoard devices. It is necessary to have RouterOS in order to install and run the MikroTik RouterOS software on the RouterBoard.

Submit
44. Jika client tidak bisa terhubung dengan mikrotik pada port 2 yang dikonfigurasi DHCP Server, opsi apakah yang harus kita cek terlebih dahulu...

Explanation

The correct answer is to check the configuration of the IP address DHCP on the client. This is because if the client is unable to connect to the Mikrotik on port 2, it could be due to an issue with the IP address configuration on the client side. By checking the DHCP configuration on the client, we can ensure that the client is receiving the correct IP address from the DHCP server and that there are no conflicts or misconfigurations causing the connectivity issue.

Submit
45. Hasil dari proses backup mikrotik yang terenkripsi dan hanya bisa di restore pada mikrotik yang menggunakan model dan tipe yang serupa adalah menggunakan ekstensi...

Explanation

The correct answer is ".backup". When MikroTik backups are encrypted, they can only be restored on MikroTik devices with similar models and types. The backup file extension for these encrypted backups is ".backup".

Submit
46. Jika kita ingin membuat sebuah user pada mikrotik yang hanya bisa diakses melalui ip address tertentu, opsi apakah yang harus kita konfigurasi ???

Explanation

The correct answer is "Allowed Address." When creating a user on Mikrotik, if we want to restrict access to only a specific IP address, we need to configure the "Allowed Address" option. This allows us to specify the IP address that the user is allowed to access the Mikrotik device from. By configuring this option, we can ensure that the user can only connect to the device from the specified IP address and restrict access from other IP addresses.

Submit
47. Berikut ini adalah yang termasuk sebagai port default aplikasi winbox adalah....

Explanation

The correct answer is 8291 because it is listed as one of the options for default winbox application ports.

Submit
48. Sebuah header paket data yang diberikan untuk selanjutnya dilakukan proses framming ke layer selanjutnya untuk di transmisikan melalui media transmisi kabel, header paket data tersebut berisi beberapa informasi diantaranya...

Explanation

The correct answer is "Source Address & Destination Address". The header packet contains information about the source address, which is the address of the sender, and the destination address, which is the address of the receiver. These addresses are used to ensure that the packet is delivered to the correct destination.

Submit
49. Apakah perbedaan antara user dengan akses write dan full pada mikrotik ???

Explanation

The answer states that the difference between a user with write access and a user with full access on MikroTik is that the user with full access has complete rights within the system, while the user with write access is restricted from performing reboot and adding new users.

Submit
50. Protocol mikrotik yang berfungsi untuk  memudahkan konfigurasi dan manajemen jaringan, juga memungkinkan setiap router mikrotik untuk menemukan router mikrotik menggunakan winbox, protocol ini dikenal dengan adalah....

Explanation

The correct answer is Mikrotik Neighbor Discovery Protocol. This protocol is used to facilitate the configuration and management of networks in Mikrotik routers. It allows each Mikrotik router to discover other Mikrotik routers using winbox.

Submit
51. Layer OSI yang bertugas untuk membentuk koneksi, kemudian memutuskannya ketika seluruh data telah terkirim atau diterima adalah...

Explanation

Layer 5 Session is responsible for establishing and terminating connections between two devices. It manages the session between the sender and receiver by initiating, coordinating, and terminating the communication. This layer ensures that all the data has been successfully transmitted and received before terminating the session. It also handles synchronization, checkpointing, and recovery of the session in case of any interruptions or errors during the transmission.

Submit
52. Packe Flow Filter Rules yang masuk ke router dikenal dengan istilah...

Explanation

The given answer is "chain = input." This is because the term "chain" refers to a sequence of rules that are applied to network traffic. In this case, the chain being referred to is the "input" chain, which is responsible for filtering incoming traffic to the router.

Submit
53. Sebelum melakukan proses netinstall pada mikrotik, konfigurasi apakah yang perlu kita lakukan ???

Explanation

Before performing a netinstall process on Mikrotik, the necessary configuration to be done is configuring Netbooting. This involves setting up the network boot server and configuring the necessary settings on the Mikrotik device to enable it to boot from the network. Netbooting allows the Mikrotik device to load the necessary files and software needed for the netinstall process from a network server instead of using local storage.

Submit
54. Parameter apakah pada konfigurasi NAT, yang berfungsi untuk menambahkan informasi Address-list secara dynamic ....

Explanation

The correct answer is "Add Src & Dst to Address List". In NAT configuration, this parameter allows the addition of source and destination addresses to the address list dynamically. This means that when a packet is being processed by NAT, the source and destination addresses will be added to the address list, providing information about the connection. This can be useful for monitoring and managing network traffic.

Submit
55. Memiliki fungsi untuk mengubah destination address pada sebuah paket data. Biasa digunakan untuk membuat host dalam jaringan lokal dapat diakses dari luar jaringan (internet) dengan cara NAT akan mengganti alamat IP tujuan paket dengan alamat IP lokal. 

Explanation

DSTNAT stands for Destination Network Address Translation. It is a function that is used to change the destination address in a data packet. It is commonly used to allow hosts in a local network to be accessed from outside the network (internet) by replacing the packet's destination IP address with a local IP address.

Submit
56. Menu apakah pada mikrotik yang berfungsi untuk menampilkan informasi log ???

Explanation

The correct answer is "Log". This menu on MikroTik is specifically designed to display information logs. It allows users to view and analyze system logs, service logs, and logging configurations. By accessing this menu, users can monitor and troubleshoot network issues by examining the log entries and identifying any errors or warnings that may have occurred.

Submit
57. Untuk mengecek user yang sedang login ke mikrotik melalui winbox, ssh, dan webfig dapat diakses melalui menu......

Explanation

The correct answer is "System > Users > Active Users". This menu option allows the user to check the active users who are currently logged in to the Mikrotik router through winbox, ssh, and webfig. By accessing this menu, the user can view the list of active users and their respective login information.

Submit
58. Hasil backup konfigurasi mikrotik yang dapat dibaca, dimodifikasi dan diubah menggunakan teks editor adalah menggunakan ekstensi...

Explanation

The correct answer is .rsc. The .rsc extension is used for backup files of MikroTik router configurations that can be easily read, modified, and changed using a text editor.

Submit
59. Istilah yang sering digunakan untuk menentukkan minimum garansi kecepatan yang dapat diterima oleh client ketika koneksi sedang sibuk / trafik sedang tinggi...

Explanation

The term commonly used to determine the minimum guaranteed speed acceptable to the client when the connection is busy or traffic is high is "Commited information Rate" (CIR). CIR represents the minimum bandwidth or data rate that the service provider guarantees to deliver to the client under normal network conditions. It ensures that the client will always have a certain level of performance, even during peak usage times.

Submit
60. sebuah cara aman untuk mengakses jaringan local area network dengan menggunakan internet atau jaringan publik adalah VPN, istilah jalur komunikasi yang digunakan oleh VPN adalah..

Explanation

A VPN (Virtual Private Network) is a secure way to access a local area network using the internet or a public network. It creates a private "tunnel" between the user's device and the network, allowing for encrypted communication and secure data transfer. The term "tunnel" refers to this secure pathway that is established by the VPN to protect the data transmitted between the user and the network.

Submit
61. Fitur Scanner pada wireless yang berfungsi untuk mendeteksi wireless di sekitar yang sedang aktif, mode apakah yang harus di gunakan oleh wireless

Explanation

The correct answer is "station". The scanner feature on a wireless device is used to detect active wireless networks in the surrounding area. In order to perform this function, the wireless device needs to be in station mode, which allows it to connect to and interact with other wireless networks as a client. This mode enables the device to scan for available networks and gather information about them.

Submit
62. Perkembangan mikrotik saat ini semakin pesat, mikrotik dapat berperan menjadi perangkat apa saja dalam jaringan mulai dari router, bridge, switch, access point, cpe, server, dllberikut ini adalah fitur server pada mikrotik adalah...

Explanation

The correct answer is Hotspot Radius. Mikrotik can function as a server for Hotspot Radius, which allows for authentication, authorization, and accounting for users accessing the network. This feature is commonly used in public Wi-Fi networks, where users need to log in or provide credentials to access the internet. The Hotspot Radius server in Mikrotik helps manage and control user access, bandwidth usage, and other network policies for a secure and efficient network experience.

Submit
63. Parameter pada Firewall yang berfungsi untuk membuat / mengelompokkan beberapa alamat ip address kedalam suatu kelompok, sehingga mempermudah dalam proses pengolahannya adalah fitur yang dikenal dengan

Explanation

The parameter in a firewall that allows for the creation or grouping of multiple IP addresses into a single list is known as an Address List. This feature simplifies the processing of these addresses and enables easier management and configuration of firewall rules.

Submit
64. Service yang menggunakan protocol UDP dan port 53 sebagai media komunikasi adalah...

Explanation

DNS (Domain Name System) is a service that translates domain names into IP addresses and vice versa. It uses the User Datagram Protocol (UDP) as the transport protocol and port 53 as the communication medium. UDP is a connectionless protocol that provides faster communication but does not guarantee the delivery of data. DNS uses UDP to efficiently resolve domain names to IP addresses without the need for establishing a connection. Therefore, DNS is the correct answer as it uses UDP and port 53 for communication.

Submit
65. Action pada filter rules yang berfungsi untuk mendaftarkan alamat website yang pernah diakses oleh client pada address-list secara dinamis adalah....

Explanation

The correct answer is "add dst to address list." This action is used to register the destination address of a website that has been accessed by a client in the address list dynamically.

Submit
66. Konfigurasi default sebuah mikrotik adalah sebagai berikut :ether 1 : dhcp clientbridge 1 : ether2-ether3-ether4-ether5,dstip address bridge : ????????dhcp server : bridge1NAT = yesBerapakah ip address interface bridge pada konfigurasi default ???

Explanation

The correct answer is 192.168.88.1/24. This is because in the given default configuration, the IP address of the bridge interface is set to 192.168.88.1 with a subnet mask of /24. This means that the bridge interface will have an IP address of 192.168.88.1 and can communicate with devices within the same subnet range of 192.168.88.0/24.

Submit
67. Memiliki fungsi untuk mengubah source address dari sebuah paket data. Sebagai contoh kasus fungsi dari chain ini banyak digunakan ketika kita melakukan akses website dari jaringan LAN. adalah fungsi dari.....

Explanation

SRCNAT stands for Source Network Address Translation. It is a function that is used to change the source address of a data packet. In the given example, SRCNAT is used when accessing a website from a LAN network. SRCNAT is commonly used in network address translation (NAT) to translate private IP addresses to public IP addresses when communicating over the internet. This allows devices on a LAN network to access the internet using a single public IP address.

Submit
68. Metode backup yang dapat membackup sebagian konfigurasi atau keseluruhan konfigurasi mikrotik, dapat dilakukan melalui new terminal, dengan menggunakan perintah....

Explanation

The correct answer is export. The export command in MikroTik allows for backing up either partial or complete configurations. It is used in the new terminal to export the configuration settings, which can later be imported or restored if needed. This command is useful for creating backups of the configuration settings to ensure that they can be easily recovered in case of any issues or changes.

Submit
69. Menu pada winbox yang berfungsi untuk melihat Tutorial Konfigurasi mikrotik pada webbrowser adalah....

Explanation

The "Manual" option in the System menu of Winbox allows users to access the manual or documentation for configuring MikroTik devices using a web browser. This option provides step-by-step instructions and guidance on how to configure various settings and features of the MikroTik router. It is a useful resource for users who are new to MikroTik devices or need assistance in configuring specific functionalities.

Submit
70. Pada menu/bagian apakah berikut ini yang tidak ditampilkan informasi identity routerboard ???

Explanation

The Start Menu Browser does not display information about the identity routerboard.

Submit
71. Perbedaan mendasar antara chain pada NAT adalah srcnat dan dstnat, fitur yang berfungsi untuk mengubah akses koneksi dari jaringan publik ke jaringan lokal

Explanation

The correct answer is dstnat. The fundamental difference between srcnat and dstnat in NAT chains is that dstnat is a feature that is used to change the access connection from a public network to a local network. This means that dstnat is responsible for modifying the destination IP address of incoming packets to redirect them to a specific host or server in the local network. On the other hand, srcnat is used to modify the source IP address of outgoing packets, allowing them to appear as if they originated from a different IP address.

Submit
72. PPP Secret adalah metode pengamanan pada mikrotik, PPP Secret dapat digunakan pada Tunneling berikut, kecuali....

Explanation

PPP Secret is a method of securing connections on Mikrotik routers. It can be used for tunneling with PPPoe, SSTP, L2TP, but not OVPN. OVPN stands for OpenVPN, which is a different protocol for secure connections.

Submit
73. action pada nat apakah yang berfungsi : menciptakan pemetaan 1:1 statis dari satu set alamat IP satu sama lain. Sering digunakan untuk mendistribusikan alamat IP publik untuk host di jaringan pribadi,

Explanation

The action "netmap" is used to create a static one-to-one mapping of IP addresses from one set to another. It is often used to distribute public IP addresses to hosts in a private network.

Submit
74. Ketika melakukan reset konfigurasi mikrotik, routerboard akan di reboot, setelah proses reboot,  berapakah ip address ether1 ???

Explanation

When performing a reset of the MikroTik configuration, the routerboard will be rebooted. After the reboot process, the IP address assigned to ether1 will be dynamic.

Submit
75. Fitur backup / restore dapat dilakukan dengan mengupload data hasil backup ke mikrotik, sehingga tersimpan pada Storage / media penyimpanan mikrotik, proses upload file backup dapat dilakukan dengan berbagai cara, kecuali....

Explanation

The correct answer is "Drag / Drog melalui browser". The given options describe different ways to upload data for backup/restore on a MikroTik device. Copy/Paste through Winbox, Drag/Drop through a browser, and Upload through FTP are valid methods. However, "Drag / Drog melalui browser" is not a valid method, as it is a misspelling of "Drag/Drop through a browser".

Submit
76. Cocokkanlah Subnetmask & Jumlah Host yang valid...
Submit
77. Berikut ini adalah opsi yang tidak akan ditanyakan pada proses konfigurasi IP > Hotspot > Setup adalah....

Explanation

During the IP configuration process for a Hotspot setup, one does not need to provide information about user profiles. User profiles are used to define specific settings for individual users, such as their authentication method, speed limits, and IP address pool. However, during the initial setup of the Hotspot, it is not necessary to configure user profiles as this can be done later on when adding users to the Hotspot system. Therefore, user profiles are not included in the options that need to be configured during the IP > Hotspot > Setup process.

Submit
78. Manakah Berikut ini yang tidak termasuk dalam opsi action pada Firewall > Filter mikrotik...

Explanation

The option "jumping" does not belong to the list of action options in Firewall > Filter mikrotik. The other options, "passthrough," "return," and "tarpit," are valid actions that can be taken in the firewall filter. However, "jumping" is not a recognized action in this context.

Submit
79. Parameter apakah yang harus di perhatikan pada menu scanner ketika kita ingin mengkoneksikan sebuah mikrotik (station) ke sebuah access point (internet) 

Explanation

When connecting a Mikrotik (station) to an access point (internet), the parameter that needs to be considered on the scanner menu is the signal strength. The signal strength indicates the quality and strength of the wireless signal between the Mikrotik and the access point. A strong signal ensures a stable and reliable connection, while a weak signal may result in a slow or unreliable connection. Therefore, monitoring and selecting a strong signal is crucial for a successful connection.

Submit
80. Untuk mengkonfigurasi layanan remote access dan port pada sebuah mikrotik, jika ingin mengubah port 80:www menjadi port 81:www, maka perintahnya adalah ??? 

Explanation

The correct answer is "> ip service set www port=81". This command is used to configure the remote access and port on a MikroTik device. By using this command, the port for the www service is changed from 80 to 81.

Submit
81. Cara menangani packet storming & Bridge Loop yang terjadi pada jaringan bridge adalah.....

Explanation

RSTP (Rapid Spanning Tree Protocol) is the correct answer to handle packet storming and Bridge Loop issues in a bridge network. RSTP is an improvement over the standard Spanning Tree Protocol (STP) and provides faster convergence in case of network topology changes. It helps in preventing loops and ensures efficient forwarding of network traffic by dynamically adjusting the network topology. By using RSTP, the network can quickly detect and resolve packet storming and Bridge Loop problems, ensuring reliable and stable network communication.

Submit
82. Action NAT yang berfungsi apabila LAN memiliki prefix yang berbeda dengan prefik pada IP Public. Misal, IP LAN memiliki prefik /24 dan akan di NAT ke IP Public dengan prefik /27. Pada saat awal koneksi, IP LAN akan diubah ke IP Public secara acak.​

Explanation

The correct answer is "same". This is because the action NAT mentioned in the question refers to Network Address Translation, which is used to translate private IP addresses to public IP addresses. In this scenario, the LAN has a different prefix (/24) compared to the public IP (/27). The "same" action in NAT means that the translated IP address will have the same prefix as the LAN IP address. Therefore, the LAN IP will be randomly changed to a public IP with a /24 prefix.

Submit
83. protocol dan port apakah yang digunakan oleh Aplikasi konfigurasi waktu NTP ???

Explanation

The correct answer is UDP 123. NTP (Network Time Protocol) is a protocol used for synchronizing the time on network devices. It uses UDP (User Datagram Protocol) as the transport protocol and port number 123. UDP is a connectionless protocol that provides a lightweight and efficient way of transmitting data over a network. Port number 123 is specifically assigned for NTP communication, allowing devices to exchange time information and maintain accurate time synchronization.

Submit
84. Berikut ini parameter apakah yang tidak ditampilkan pada menu Scanner Mikrotik....

Explanation

The IP Address parameter is not displayed on the Scanner Mikrotik menu.

Submit
85. Parameter yang paling penting yang digunakan untuk mengkonfigurasi sebuah EoIP adalah.....

Explanation

The most important parameter used to configure an EoIP (Ethernet over IP) is the Remote Address and Tunnel ID. The Remote Address specifies the IP address of the remote EoIP tunnel endpoint, allowing the establishment of a connection between two remote networks. The Tunnel ID is a unique identifier assigned to the EoIP tunnel, ensuring that the correct tunnel is used for data transmission. These parameters are crucial in setting up and maintaining a secure and reliable EoIP connection.

Submit
86. Berikut ini yang tidak termasuk dalam opsi type pada Hotspot > IP Binding pada mikrotik adalah....

Explanation

The given options are bypassed, reguler, blocked, and filtering. The question asks for the option that is not included in the type of Hotspot > IP Binding on MikroTik. The correct answer is "filtering" because it is not a type of IP Binding in the Hotspot configuration.

Submit
87. Fitur pada DNS yang berfungsi untuk membuat sebuah alamat DNS lokal pada mikrotik adalah,...

Explanation

The correct answer is "Static". Static DNS feature allows the creation of a local DNS address on a MikroTik device. This means that the device can resolve domain names locally without having to query external DNS servers. It is useful for faster and more efficient DNS resolution within the local network.

Submit
88. Service apakah berikut ini yang menggunakan protocol TCP dan menggunakan port 161

Explanation

SMTP (Simple Mail Transfer Protocol) is the correct answer. SMTP is a service that uses the TCP protocol and port 161 is not associated with SMTP, but rather with SNMP (Simple Network Management Protocol). NTP (Network Time Protocol) uses port 123 and POP3 (Post Office Protocol version 3) uses port 110. Therefore, the correct answer is SMTP.

Submit
89. Opsi firewall pada mikrotik yang bertugas untuk membuat sebuah log user yang sering melakkan ping ke router adalah...

Explanation

The correct answer is "ip firewall filter add chain=input protocol=icmp action=log". This option specifies that the firewall filter should be added to the input chain, and it should log any ICMP traffic. ICMP is the protocol used for ping requests, so this filter will log any pings sent to the router by users.

Submit
90. Mikrotik Routerboard tidak memiliki fitur CMOS / battery sehingga pengaturan waktu sering terjadi error, maka solusi agar konfigurasi waktu pada mikrotik tersimpan secara otomatis  adalah menggunakan NTP Client, pada menu apakah kita mengkonfigurasi NTP

Explanation

The correct answer is SNTP Client. Mikrotik Routerboard does not have a CMOS/battery feature, which often causes time settings to have errors. To ensure that the time configuration on the Mikrotik is saved automatically, the solution is to use an SNTP Client. This allows the router to synchronize its time with an SNTP server, ensuring accurate timekeeping.

Submit
91. Berikut ini adalah mode wireless yang tidak termasuk pada interface wlan1 adalah...

Explanation

The mode "AP-Bridging" is not included on the wlan1 interface.

Submit
92. Pada menu wireless apakah kita mengakses informasi tentang jumlah client yang terhubung dengan mikrotik ????

Explanation

The correct answer is "Registration". In the menu "Registration" on the wireless settings of a MikroTik device, we can access information about the number of clients that are connected to the device. This menu allows us to view and manage the registration of clients to the wireless network.

Submit
93. Opsi menu pada firewall yang berfungsi untuk melakukan connection tracking pada mikrotik adalah...

Explanation

The correct answer is "Connections". This option on the firewall allows for connection tracking on a MikroTik device. It enables the device to keep track of all established connections and their states, such as new, established, and related connections. This feature is essential for monitoring and managing network traffic and ensuring the security and efficiency of the network.

Submit
94. Pada parameter manakah pada DHCP Client yang digunakan untuk melihat informasi masa berlaku ip address.....

Explanation

The correct answer is "Expires After". This parameter in the DHCP Client is used to view the information about the expiration time of the IP address lease. It indicates the duration for which the IP address is valid and can be used by the client device. After the expiration time, the client device will need to renew the lease or request a new IP address from the DHCP server.

Submit
95. Merupakan protocol pada Mikrotik RouterOS yang berfungsi untuk membangun sebuah Network Tunnel antar MikroTik router di atas sebuah koneksi TCP/IP

Explanation

EoIP (Ethernet over IP) is a protocol in MikroTik RouterOS that is used to create a network tunnel between MikroTik routers over a TCP/IP connection. This allows for the encapsulation of Ethernet frames within IP packets, enabling the routers to communicate with each other as if they were directly connected on the same network. EoIP is commonly used for creating virtual LANs (VLANs) or extending networks over long distances.

Submit
96. Penerapan pengaturan firewall pada mikrotik yang memblok seluruh trafik yang masuk dan mengizinkan hanya akses masuk ke protocol tcp dan aplikasi web adalah....

Explanation

The correct answer is "ip firewall filter add chain=input action=drop
ip firewall filter add chain=input protocol=tcp port=80 action=accept". This answer is correct because it shows the correct configuration for the firewall on a MikroTik router. It sets the chain to "input", which means it will apply to incoming traffic, and it specifies that any traffic with the protocol TCP and port 80 should be accepted, while all other traffic should be dropped. This effectively blocks all incoming traffic except for TCP traffic on port 80, which is typically used for web applications.

Submit
97. Fitur pembuatan TRANSPARENT PROXY pada mikrotik, agar layanan akses browser client di arahkan ke proxy secara otomatis adalah.....

Explanation

The correct answer is DSTNAT. DSTNAT stands for Destination NAT, which is a feature in MikroTik that allows the automatic redirection of client browser access to a proxy. By using DSTNAT, the MikroTik router can modify the destination IP address of incoming packets, redirecting them to the proxy server. This ensures that all browser requests from clients are automatically directed to the proxy server for processing.

Submit
98. aturan firewall yang dapat diterapkan untuk melindungi winbox router agar tidak dapat diakses melalui jaringan public (internet) dapat diterapkan dengan perintah....

Explanation

The correct answer is "ip firewall filter nat add chain=input protocol=tcp port=8291 action=drop." This command adds a rule to the NAT firewall filter in the input chain, specifying that any incoming TCP traffic on port 8291 should be dropped. This effectively blocks access to the winbox router from the public network (internet).

Submit
99. Jika kita ingin menkonfigurasi service dan port winbox dapat mengakses melalui menu IP > Services, namun jika kita hanya ingin mengaktifkan sebuah service khusus untuk ip address tertentu saja, maka opsi yang harus kita konfigurasi adalah....

Explanation

The correct answer is "Available From". This option allows us to specify the IP address or range of IP addresses that are allowed to access the service. By configuring the "Available From" option, we can restrict access to the Winbox service to only a specific IP address or a range of IP addresses, ensuring that only authorized users can access the service.

Submit
100. Berikut ini adalah aturan firewall yang dapat digunakan untuk membuat daftar user yang tidak bisa mengakses internet, berdasarkan ping yang dilakukannya ke internet,...ip firewall filter add chain=input protocol=icmp action=add-src-to-address-list address-list=tukang_pingopsi rule selanjutnya yang dapat di ketikkan adalah... 

Explanation

The correct answer is "ip firewall filter add chain=forward protocol=tcp action=accept src-address-list=!tukang_ping". This rule is adding a filter to the firewall's forward chain, specifying that any TCP traffic from a source address not in the "tukang_ping" address list should be accepted. This means that users who have not been added to the "tukang_ping" address list will be allowed to access the internet.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 25, 2017
    Quiz Created by
    Walidtkj
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Opsi yang perlu di pilih ketika ingin menonaktifkan sebuah package...
Cara paling mudah untk mengkonfigurasi sebuah perangkat mikrotik...
Menu pada wireless untuk mengkonfigurasi pengamanan / security...
Pada menu apakah jika kita ingin melakukan konfigurasi Identity pada...
Berikut ini, yang tidak termasuk package aplikasi pada mikrotik...
Menginstall mikrotik router OS di PC dapat dilakukan dengan...
Perhatikan kedua baris perintah mikrotik diatas, perbedaan mendasar...
Perbedaan mendasar aplikasi remote access Telnet dan SSH adalah...
RouterOS Mikrotik versi x86 adalah versi mikrotik yang hanya dapat...
Pada menu apakah kita melihat informasi ip address dynamic (DHCP...
Fitur mikrotik yang berfungsi untuk melindungi router dari akses yang...
Proses pengaksesan mikrotik ke router berdasarkan pengaturan user dan...
Dalam melakukan setting / konfigurasi DNS Server pada mikrotik, opsi...
User dalam mikrotik dikategorikan kedalam beberapa group sesuai hak...
Reset konfigurasi dan aplikasi mikrotik dapat dilakukan dengan 3 cara...
Apakah fungsi dan kegunaan parameter "Use Peer DNS" pada...
Konfigurasi action pada NAT yang berfungsi untuk mengkonfigurasi...
Jika router bisa ping ke ip address public (contoh : 8.8.8.8), namun...
Proses backup dan restore, dapat dilakukan melalui storage yang...
Secara default chain apakah yang termasuk pada fitur Firewall Filter...
Berapakah jumlah host dari network address berikut....192.168.1.64/27
Bridge adalah sebuah fitur yang berfungsi untuk menggabungkan...
Jika di perhatikan ada perubahan warna pada icon Queue rule. maksud...
Model arsitektural jaringan komputer yang dikembangkan sebagai standar...
Untuk mengakses mikrotik dalam mode teks menggunakan fitur SSH /...
Untuk mengakses sebuah mikrotik melalui jalur Webfig maka kita...
Status apakah yang ditampilkan pada status DHCP Client, ketika...
Berikut ini adalah protocol yang umumnya digunakan oleh beberapa...
Metode yang digunakan untuk menghubungkan banyak komputer ke jaringan...
Berikut ini yang tidak termasuk dalam jenis alamat MAC Address pada...
Kecepatan maksimal transfer data pada standar wireless 802.11g 2.4GHz...
Pembagian sebuah network address, menjadi kelompok-kelompok network...
Sebuah mikrotik yang dibackup melalui menu File pada winbox, jika...
Fitur Walled Garden adalah fitur untuk mengizinkan pengguna untuk...
Bit-bit yang dikelompok menjadi frame-frame untuk selanjutnya diproses...
Pada dasarnya sebuah router berfungsi untuk menghubungkan network yang...
Paket data yang dikirim oleh client yang memiliki tujuan ke internet,...
Manajemen bandwidth yang bekerja dengan sebuah algoritma yang akan...
Ketika melakukan reset konfigurasi mikrotik, routerboard akan di...
Berikut ini, apakah opsi konfigurasi yang tidak terdapat pada menu...
Agar sebuah konfigurasi DHCP Client tidak mendapatkan informasi...
Teknik yang digunakan untuk memperluas jaringan dari access point...
Untuk melakukan installasi mikrotik routeros pada routerboard dapat...
Jika client tidak bisa terhubung dengan mikrotik pada port 2 yang...
Hasil dari proses backup mikrotik yang terenkripsi dan hanya bisa di...
Jika kita ingin membuat sebuah user pada mikrotik yang hanya bisa...
Berikut ini adalah yang termasuk sebagai port default aplikasi winbox...
Sebuah header paket data yang diberikan untuk selanjutnya dilakukan...
Apakah perbedaan antara user dengan akses write dan full pada mikrotik...
Protocol mikrotik yang berfungsi untuk  memudahkan konfigurasi...
Layer OSI yang bertugas untuk membentuk koneksi, kemudian...
Packe Flow Filter Rules yang masuk ke router dikenal dengan istilah...
Sebelum melakukan proses netinstall pada mikrotik, konfigurasi apakah...
Parameter apakah pada konfigurasi NAT, yang berfungsi untuk...
Memiliki fungsi untuk mengubah destination address pada sebuah paket...
Menu apakah pada mikrotik yang berfungsi untuk menampilkan informasi...
Untuk mengecek user yang sedang login ke mikrotik melalui winbox, ssh,...
Hasil backup konfigurasi mikrotik yang dapat dibaca, dimodifikasi dan...
Istilah yang sering digunakan untuk menentukkan minimum garansi...
Sebuah cara aman untuk mengakses jaringan local area network...
Fitur Scanner pada wireless yang berfungsi untuk mendeteksi wireless...
Perkembangan mikrotik saat ini semakin pesat, mikrotik dapat berperan...
Parameter pada Firewall yang berfungsi untuk membuat / mengelompokkan...
Service yang menggunakan protocol UDP dan port 53 sebagai media...
Action pada filter rules yang berfungsi untuk mendaftarkan alamat...
Konfigurasi default sebuah mikrotik adalah sebagai berikut :ether 1 :...
Memiliki fungsi untuk mengubah source address dari sebuah paket data....
Metode backup yang dapat membackup sebagian konfigurasi atau...
Menu pada winbox yang berfungsi untuk melihat Tutorial Konfigurasi...
Pada menu/bagian apakah berikut ini yang tidak ditampilkan informasi...
Perbedaan mendasar antara chain pada NAT adalah srcnat dan dstnat,...
PPP Secret adalah metode pengamanan pada mikrotik, PPP Secret...
Action pada nat apakah yang berfungsi : menciptakan pemetaan 1:1...
Ketika melakukan reset konfigurasi mikrotik, routerboard akan di...
Fitur backup / restore dapat dilakukan dengan mengupload data hasil...
Cocokkanlah Subnetmask & Jumlah Host yang valid...
Berikut ini adalah opsi yang tidak akan ditanyakan pada proses...
Manakah Berikut ini yang tidak termasuk dalam opsi action pada...
Parameter apakah yang harus di perhatikan pada menu scanner ketika...
Untuk mengkonfigurasi layanan remote access dan port pada sebuah...
Cara menangani packet storming & Bridge Loop yang terjadi pada...
Action NAT yang berfungsi apabila LAN memiliki prefix yang berbeda...
Protocol dan port apakah yang digunakan oleh Aplikasi konfigurasi...
Berikut ini parameter apakah yang tidak ditampilkan pada menu Scanner...
Parameter yang paling penting yang digunakan untuk mengkonfigurasi...
Berikut ini yang tidak termasuk dalam opsi type pada Hotspot > IP...
Fitur pada DNS yang berfungsi untuk membuat sebuah alamat DNS lokal...
Service apakah berikut ini yang menggunakan protocol TCP dan...
Opsi firewall pada mikrotik yang bertugas untuk membuat sebuah log...
Mikrotik Routerboard tidak memiliki fitur CMOS / battery sehingga...
Berikut ini adalah mode wireless yang tidak termasuk pada interface...
Pada menu wireless apakah kita mengakses informasi tentang jumlah...
Opsi menu pada firewall yang berfungsi untuk melakukan connection...
Pada parameter manakah pada DHCP Client yang digunakan untuk melihat...
Merupakan protocol pada Mikrotik RouterOS yang berfungsi untuk...
Penerapan pengaturan firewall pada mikrotik yang memblok seluruh...
Fitur pembuatan TRANSPARENT PROXY pada mikrotik, agar layanan akses...
Aturan firewall yang dapat diterapkan untuk melindungi winbox router...
Jika kita ingin menkonfigurasi service dan port winbox dapat mengakses...
Berikut ini adalah aturan firewall yang dapat digunakan untuk membuat...
Alert!

Advertisement