What does the passive command provide to dynamic routing protocols?
What configuration is added by /ip Hot-Spot setup command? (select all that apply)
[admin@MikroTik] /ip hotspot> print Flags: X - disabled, I - invalid, S - HTTPS # NAME INTERFACE ADDRESS-POOL PROFILE IDLE-TIMEOUT 0 hotspot1 ether3 hs-pool-3 hsprof1 5m [admin@MikroTik] /ip hotspot> [admin@MikroTik] /ip pool> print # NAME RANGES 0 hs-pool-3 10.5.50.2-10.5.50.254 [admin@MikroTik] /ip pool> /ip dhcp-server [admin@MikroTik] /ip dhcp-server> print Flags: X - disabled, I - invalid # NAME INTERFACE RELAY ADDRESS-POOL LEASE-TIME ADD-ARP 0 dhcp1 ether3 hs-pool-3 1h [admin@MikroTik] /ip dhcp-server> /ip firewall nat [admin@MikroTik] /ip firewall nat> print Flags: X - disabled, I - invalid, D - dynamic 0 X ;;; place hotspot rules here chain=unused-hs-chain action=passthrough 1 ;;; masquerade hotspot network chain=srcnat action=masquerade src-address=10.5.50.0/24 [admin@MikroTik] /ip firewall nat>
/ip hotspot user
/ip hotspot profile
/ip hotspot ip-binding
Which are necessary sections in /queue simple to set bandwidth limitation?
Firewall NAT rules process only the first packet of each connection.
Which protocol does Ping use?
What protocol is used for Ping and Trace route?
Alasan:
UDP traceroute is similar to ICMP traceroute in the fact that it plays with the TTL field in the IP header. In a UDP traceroute, the client transmits a simple UDP packet to an invalid destination port value.
The basic unit of a physical network (OSI Layer 1) is the:
What kind of users are listed in the Secrets window of the PPP menu?
What menus should be used to allow certain websites to be accessed from behind a Hot-Spot interface, without client authentication
What is necessary for PPPoE client configuration?
How long is level 1 (demo) license valid?
A. 24 Hour
yang dimaksudkan lama valid digunakannya bukan lama penggunaan
Which of the following are layers in the TCP/IP model?
Application
Session
Transport
Internet
Data Link
Physical
Application
Session
Transport
Internet
Data Link
Physical
Which of the following keystrokes enables safe mode in console:
alasan
What is a stub network?
Collisions are possible in fullduplex Ethernet networks
What is the correct action for a NAT rule on a router that should intercept SMTP traffic and send it over to a specified mail server?
Alasan
intercept itu artinya mencegat/ memblok.
To a particular Mail Server, meaning the mail server is outside the proxy itself, then the action that can be used is dst-nat
Untuk Mail Server tertentu, artinya mail server berada di luar proxy itu sendiri, maka action yang bisa digunakan adalah dst-nat
What is the correct action to be specified in the NAT rule to hide a private network when communicating to the outside world?
NAT Action (6 specific action NAT)
- dst-nat and redirect
- src-nat and masquarade
- netmap
- same
- Action “masquerade” changes packet’s source address router’s address and specified port
- This action can take place only in chain srcnat
- Typical application: hide specific LAN resources behind one dynamic public IP address
How many layers does Open Systems Interconnection model have?
MAC layer by OSI model is also known as
There are two routes in the routing table:
0 dst-addr=10.1.1.0/24 gateway=5.5.5.5
1 dst-addr=10.1.1.4/30 gateway=5.6.6.6
Which gateway will be used to get to the IP address 10.1.1.6?
0 dst-addr=10.1.1.0/24 gateway=5.5.5.5
1 dst-addr=10.1.1.4/30 gateway=5.6.6.6
Which gateway will be used to get to the IP address 10.1.1.6?
What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized
Standard
IEEE
Extended
Specialized
For user in local PPP Secrets/PPP Profiles database, it is possible to
If you wanted to delete the configuration stored in NVRAM, what would you type?
Which is the default port of IP-Winbox?
On the Wireless path with mode = ap-bridge. According to tool constraints, what is the maximum number of clients that can be connected to it?
A. 2012
B. 2048
C. 1024
D. 2007
A. 2012
B. 2048
C. 1024
D. 2007
The router's firewall rules are:
/ ip firewall filter add chain = forward action = jump jump-target = custom
/ ip firewall filter add chain = custom action = passthrough
/ ip firewall filter add chain = forward action = log
When traffic reaches the end of 'chain = custom'. What will happen next?
A. Traffic will continue in the chain = forward action = log
B. Traffic will be accepted in the chain = custom
C. Traffic will be dropped in the chain = custom
/ ip firewall filter add chain = forward action = jump jump-target = custom
/ ip firewall filter add chain = custom action = passthrough
/ ip firewall filter add chain = forward action = log
When traffic reaches the end of 'chain = custom'. What will happen next?
A. Traffic will continue in the chain = forward action = log
B. Traffic will be accepted in the chain = custom
C. Traffic will be dropped in the chain = custom
alasan:
jawabannya A, end chain
A. Any directory in / files
B. FTP the root directory or / files directory of the router
C. System Backup menu
D. System Package menu
alasan: b
Discussion: Router OS Mikrotik Firmware must be placed / uploaded to the outermost folder or commonly called the root folder so that it can be read by the proxy system and upgraded.