Soal MTCNA dummy 1-25

 What does the passive command provide to dynamic routing protocols?

What configuration is added by /ip Hot-Spot setup command? (select all that apply)

[admin@MikroTik] /ip hotspot> print 
Flags: X - disabled, I - invalid, S - HTTPS 
 #   NAME        INTERFACE       ADDRESS-POOL       PROFILE       IDLE-TIMEOUT
 0   hotspot1    ether3          hs-pool-3          hsprof1       5m 
[admin@MikroTik] /ip hotspot> 
[admin@MikroTik] /ip pool> print 
 # NAME                                        RANGES                         
 0 hs-pool-3                                   10.5.50.2-10.5.50.254          
[admin@MikroTik] /ip pool> /ip dhcp-server 
[admin@MikroTik] /ip dhcp-server> print 
Flags: X - disabled, I - invalid 
 #   NAME      INTERFACE    RELAY           ADDRESS-POOL    LEASE-TIME ADD-ARP
 0   dhcp1     ether3                       hs-pool-3       1h        
[admin@MikroTik] /ip dhcp-server> /ip firewall nat 
[admin@MikroTik] /ip firewall nat> print 
Flags: X - disabled, I - invalid, D - dynamic 
 0 X ;;; place hotspot rules here
     chain=unused-hs-chain action=passthrough 

 1   ;;; masquerade hotspot network
     chain=srcnat action=masquerade src-address=10.5.50.0/24 
[admin@MikroTik] /ip firewall nat> 
/ip hotspot user
/ip hotspot profile
/ip hotspot ip-binding


Which are necessary sections in /queue simple to set bandwidth limitation?



Firewall NAT rules process only the first packet of each connection.

Which protocol does Ping use?

What protocol is used for Ping and Trace route?


Alasan:
UDP traceroute is similar to ICMP traceroute in the fact that it plays with the TTL field in the IP header. In a UDP traceroute, the client transmits a simple UDP packet to an invalid destination port value.

The basic unit of a physical network (OSI Layer 1) is the:


What kind of users are listed in the Secrets window of the PPP menu?


What menus should be used to allow certain websites to be accessed from behind a Hot-Spot interface, without client authentication



What is necessary for PPPoE client configuration?


How long is level 1 (demo) license valid?

     A. 24 Hour



yang dimaksudkan lama valid digunakannya bukan lama penggunaan

Which of the following are layers in the TCP/IP model?
Application
Session
Transport
Internet
Data Link
Physical




Which of the following keystrokes enables safe mode in console:


alasan

Control-C
keyboard interrupt.
Control-D
log out (if input line is empty)
Control-K
clear from cursor to the end of line
Control-X
toggle safe mode
Control-V
toggle hotlock mode mode



What is a stub network?


Collisions are possible in fullduplex Ethernet networks

What is the correct action for a NAT rule on a router that should intercept SMTP traffic and send it over to a specified mail server?


Alasan
intercept itu artinya mencegat/ memblok.
To a particular Mail Server, meaning the mail server is outside the proxy itself, then the action that can be used is dst-nat 
Untuk Mail Server tertentu, artinya mail server berada di luar proxy itu sendiri, maka action yang bisa digunakan adalah dst-nat



What is the correct action to be specified in the NAT rule to hide a private network when communicating to the outside world?

NAT Action (6 specific action NAT)

  • dst-nat and redirect
  • src-nat and masquarade
  • netmap
  • same
  • Action “masquerade” changes packet’s source address router’s address and specified port
  • This action can take place only in chain srcnat
  • Typical application: hide specific LAN resources behind one dynamic public IP address
How many layers does Open Systems Interconnection model have?

MAC layer by OSI model is also known as



There are two routes in the routing table:
0 dst-addr=10.1.1.0/24 gateway=5.5.5.5
1 dst-addr=10.1.1.4/30 gateway=5.6.6.6
Which gateway will be used to get to the IP address 10.1.1.6?




What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized


For user in local PPP Secrets/PPP Profiles database, it is possible to


If you wanted to delete the configuration stored in NVRAM, what would you type?


Which is the default port of IP-Winbox?



On the Wireless path with mode = ap-bridge. According to tool constraints, what is the maximum number of clients that can be connected to it?
A. 2012
B. 2048
C. 1024
D. 2007



The router's firewall rules are:
/ ip firewall filter add chain = forward action = jump jump-target = custom
/ ip firewall filter add chain = custom action = passthrough
/ ip firewall filter add chain = forward action = log
When traffic reaches the end of 'chain = custom'. What will happen next?
A. Traffic will continue in the chain = forward action = log
B. Traffic will be accepted in the chain = custom
C. Traffic will be dropped in the chain = custom    

  alasan:
jawabannya A, end chain    





Where should you upload the new MikroTik RouterOS package package to upgrade the router?
A. Any directory in / files
B. FTP the root directory or / files directory of the router
C. System Backup menu
D. System Package menu            
alasan: b
Discussion: Router OS Mikrotik Firmware must be placed / uploaded to the outermost folder or commonly called the root folder so that it can be read by the proxy system and upgraded.

Related Posts

There is no other posts in this category.
Subscribe Our Newsletter