1.
MAC layer by OSI model is also known as
Correct Answer
A. Layer 2
Explanation
The correct answer is Layer 2. The MAC layer, also known as the Media Access Control layer, is responsible for controlling access to the physical medium and handling the transmission of data frames. It is located at Layer 2 of the OSI model.
2.
The basic unit of a physical network (OSI Layer 1) is the:
Correct Answer
C. Bit
Explanation
The basic unit of a physical network at the OSI Layer 1 is a bit. A bit is the smallest unit of data in a computer and can have a value of either 0 or 1. At the physical layer, data is transmitted in the form of electrical or optical signals, which are represented as bits. These bits are then grouped together to form bytes, frames, and headers at higher layers of the OSI model. However, at the physical layer, the individual units of data being transmitted are bits.
3.
Which of the following protocols / ports are used for SNMP. (Simple Network Management Protocol)
Correct Answer(s)
A. UDP 162
C. UDP 161
Explanation
SNMP (Simple Network Management Protocol) primarily uses UDP (User Datagram Protocol) for communication. UDP port 161 is used for SNMP requests and port 162 is used for SNMP traps. TCP (Transmission Control Protocol) is not commonly used for SNMP, and none of the other ports listed are associated with SNMP.
4.
Which ones of the following are valid IP addresses?
Correct Answer(s)
A. 192.168.13.255
C. 10.10.14.0
D. 1.27.14.254
Explanation
The first IP address, 192.168.13.255, is valid because it falls within the range of 0.0.0.0 to 255.255.255.255, which is the valid range for IP addresses. The second IP address, 192.168.256.1, is not valid because the octet "256" is outside the range of 0 to 255. The third IP address, 10.10.14.0, is valid because all the octets fall within the valid range. The fourth IP address, 1.27.14.254, is also valid because all the octets fall within the valid range.
5.
Choose all valid hosts address range for subnet 15.242.55.62/27
Correct Answer
C. 15.242.55.33-15.242.55.62
Explanation
The given subnet is 15.242.55.62/27, which means that it has a subnet mask of 27 bits. This leaves 5 bits for the host portion of the IP address. The valid hosts address range for this subnet would be from the network address + 1 to the broadcast address - 1.
The network address can be obtained by setting all the host bits to 0, which gives us 15.242.55.32. The broadcast address can be obtained by setting all the host bits to 1, which gives us 15.242.55.63. Therefore, the valid hosts address range for this subnet is 15.242.55.33-15.242.55.62.
6.
How many IP addresses can one find in the header of an IP packet?
Correct Answer
A. 2
Explanation
In the header of an IP packet, there are two IP addresses. The first IP address is the source IP address, which identifies the sender of the packet. The second IP address is the destination IP address, which identifies the intended recipient of the packet. These IP addresses are crucial for routing the packet across the network and ensuring it reaches the correct destination.
7.
In MikroTik RouterOS, Layer-3 communication between 2 hosts can be achieved by using an address
Correct Answer(s)
A. /30
C. /32
D. /29
Explanation
In MikroTik RouterOS, a /30 subnet mask is used for Layer-3 communication between 2 hosts. A /30 subnet mask provides 2 usable IP addresses, allowing for communication between the two hosts. A /31 subnet mask is not commonly used as it only provides 1 usable IP address. A /32 subnet mask is used for loopback addresses and a /29 subnet mask provides 6 usable IP addresses, which is more than what is required for communication between 2 hosts.
8.
Which of the following is NOT a valid MAC Address?
Correct Answer
E. 80:GF:AA:67:13:5D
9.
A network-ready device is directly connected to a MikroTik RouterBOARD 750 with a correct U.T.P. RJ45
functioning cable. The device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of
255.255.255.252. What will be a valid IPv4 address for the RouterBOARD 750 for a successful connection to
the device?
Correct Answer
B. 192.168.100.69/255.255.255.252
Explanation
The given device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of 255.255.255.252. This means that the device is using a /30 subnet, which allows for only 2 usable IP addresses. The valid IP addresses in this subnet range are 192.168.100.68 and 192.168.100.69. Since the device is already using 192.168.100.70, the valid IP address for the RouterBOARD 750 to successfully connect to the device would be 192.168.100.69.
10.
You have a router with configuration
- Public IP :202.168.125.45/24
- Default gateway:202.168.125.1
- DNS server: 248.115.148.136, 248.115.148.137
- Local IP: 192.168.2.1/24
Mark the correct configuration on client PC to access to the Internet
Correct Answer
B. IP:192.168.2.115/24 gateway: 192.168.2.1
Explanation
The correct configuration on the client PC to access the internet is IP:192.168.2.115/24 gateway: 192.168.2.1. This is because the client PC should have an IP address within the same subnet as the router's local IP address, which is 192.168.2.1/24. The gateway should also be set to the router's local IP address, which is 192.168.2.1, in order to access the internet through the router.
11.
Collisions are possible in full-duplex Ethernet networks.
Correct Answer
B. False
Explanation
Collisions are not possible in full-duplex Ethernet networks. In full-duplex mode, data can be transmitted and received simultaneously, eliminating the possibility of collisions. Each device has its own dedicated transmit and receive channels, allowing for full-duplex communication without any collisions.
12.
Which of the following IP addresses are publicly routable?
Correct Answer
D. 11.3.10.4
Explanation
The IP address 11.3.10.4 is publicly routable because it falls within the range of public IP addresses. The other three IP addresses (127.34.155.3, 172.16.13.23, and 192.168.1.4) are not publicly routable because they are reserved for private networks and cannot be directly accessed over the internet.
13.
The network address is
Correct Answer
C. The first address of the subnet
Explanation
The network address refers to the first address of the subnet. It is the address that represents the network itself and is used for routing purposes. The first usable address of the subnet would be the second address, as the first address is reserved for the network address. The last address of the subnet is typically used as the broadcast address, so it is not considered the network address.
14.
What is term for the hardware coded address found on an interface?
Correct Answer
C. MAC Address
Explanation
A MAC address, also known as a Media Access Control address, is a hardware coded address found on an interface. It is a unique identifier assigned to network interfaces for communications on the physical network. MAC addresses are used to ensure that data is sent to the correct device within a network. Unlike IP addresses that can change, MAC addresses are permanent and cannot be modified. Therefore, the correct answer for the term of the hardware coded address found on an interface is MAC Address.
15.
If ARP=reply-only is enabled on one router interface, the router can add dynamic ARP entries for the particular interface.
Correct Answer
B. False
Explanation
If ARP=reply-only is enabled on one router interface, the router cannot add dynamic ARP entries for that interface. The reply-only mode only allows the router to respond to ARP requests from other devices, but it does not allow the router to initiate ARP requests or add dynamic ARP entries. Therefore, the statement is false.
16.
How many layers does Open Systems Interconnection model have?
Correct Answer
D. 7
Explanation
The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it. These layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Therefore, the correct answer is 7.
17.
Select which of the following are 'Public IP addresses':
Correct Answer(s)
C. 11.63.72.2
E. 172.168.254.2
Explanation
Public IP addresses are IP addresses that are assigned to devices connected to the public internet. They are unique and can be accessed from anywhere on the internet. In the given options, 11.63.72.2 and 172.168.254.2 are public IP addresses because they are not in the private IP address ranges (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16). The other options (172.28.73.21, 10.110.50.37, and 192.168.0.1) are private IP addresses, which are used for local network communication and cannot be directly accessed from the internet.
18.
Select valid MAC-address
Correct Answer
B. 00:00:5E:80:EE:B0
Explanation
The given MAC address, 00:00:5E:80:EE:B0, is a valid MAC address. MAC addresses are unique identifiers assigned to network interfaces, and they consist of six pairs of hexadecimal digits separated by colons. The given MAC address follows this format and does not contain any invalid characters or incorrect formatting. Therefore, it is a valid MAC address.
19.
How many usable IP addresses are there in a 23-bit (255.255.254.0) subnet?
Correct Answer
D. 510
Explanation
A 23-bit subnet mask (255.255.254.0) allows for a total of 9 bits to be used for host addresses. Since each bit can be either 0 or 1, this results in 2^9 possible combinations. However, the first and last combinations are reserved for network and broadcast addresses, leaving 2^9 - 2 = 510 usable IP addresses.
20.
How many usable IP addresses are there in a 20-bit subnet?
Correct Answer
E. 4094
Explanation
A 20-bit subnet allows for 2^20 total addresses. However, 2 addresses are reserved for network and broadcast addresses, leaving 2^20 - 2 = 4094 usable IP addresses.
21.
If ARP=reply-only is configured on an interface, what will this interface do?
Correct Answer
E. Accept all IP/MAC combinations listed in /ip arp as static entries
Explanation
When ARP=reply-only is configured on an interface, the interface will accept all IP/MAC combinations listed in the /ip arp list as static entries. This means that any IP address and MAC address combination listed in the ARP table will be considered as valid and static, and the interface will not send ARP requests for these entries. This can be useful in scenarios where specific IP/MAC combinations need to be treated as static and not be subject to ARP requests.
22.
What protocol does ping use?
Correct Answer
B. ICMP
Explanation
Ping uses the ICMP (Internet Control Message Protocol) protocol. ICMP is a network protocol used to send diagnostic messages and error reports between network devices. Ping uses ICMP echo requests and echo replies to measure the round-trip time and packet loss between two devices on a network. ICMP is a connectionless protocol that operates at the network layer of the OSI model, making it suitable for troubleshooting network connectivity and determining if a host is reachable.
23.
Which computers would be able to communicate directly (without any routers involved)
Correct Answer(s)
C. 10.5.5.1/24 and 10.5.5.100/25
D. 10.10.0.17/22 and 10.10.1.30/23
24.
What does the firewall action "Redirect" do? Select all true statements.
Correct Answer(s)
A. Redirects a packet to a specified port on the router
B. Redirects a packet to the router
Explanation
The "Redirect" firewall action redirects a packet to a specified port on the router. It can also redirect a packet directly to the router itself.
25.
What is necessary for PPPoE client configuration?
Correct Answer
B. Interface (on which PPPoE client is going to work)
Explanation
The necessary requirement for PPPoE client configuration is the interface on which the PPPoE client is going to work. This is because the interface is the connection point between the client and the PPPoE server, allowing the client to establish and maintain the PPPoE connection. Without specifying the interface, the client would not be able to connect to the PPPoE server and establish the required connection.
26.
MikroTik RouterOS commands can be run once a day by:
Correct Answer
C. /system scheduler
Explanation
The correct answer is /system scheduler. MikroTik RouterOS commands can be scheduled to run at specific times using the /system scheduler command. This allows users to automate tasks and execute commands at regular intervals, such as once a day. The scheduler can be configured to run commands at a specific time, on specific days of the week, or even periodically with a defined interval. This feature provides flexibility and convenience for managing and automating tasks on the MikroTik router.
27.
It is possible to use WPA and WPA2 authentication type at the same time with one security profile.
Correct Answer
A. True
Explanation
It is possible to use both WPA and WPA2 authentication types simultaneously within a single security profile. This allows for increased flexibility and compatibility with different devices and network configurations. By supporting both authentication types, the network can accommodate devices that only support WPA or WPA2, ensuring that all devices can connect securely. This capability enhances the overall security and accessibility of the network.
28.
Netinstall can be used to
Correct Answer(s)
C. Install different software version (upgrade or downgrade)
D. Reinstall software without losing licence
Explanation
Netinstall can be used to install different software versions, allowing for upgrades or downgrades. It can also be used to reinstall software without losing the license. This means that if there is a need to change the software version or if there is a need to reinstall the software, Netinstall can be used to accomplish this without the risk of losing the license.
29.
The highest queue priority is
Correct Answer
B. 1
Explanation
The correct answer is 1 because in a queue, the priority is usually determined by a numerical value, with lower numbers indicating higher priority. In this case, 1 has the lowest value among the given options, indicating the highest priority in the queue.
30.
Is it possible to limit how many clients are able to connect to an access point?
Correct Answer
C. Yes, but only with access-lists
Explanation
Yes, it is possible to limit how many clients are able to connect to an access point using access-lists. Access-lists allow network administrators to control and filter network traffic based on specific criteria, such as the number of clients allowed to connect. By configuring access-lists on the access point, the administrator can set a limit on the maximum number of clients that can connect to the access point simultaneously.
31.
Which of the following Routes statuses are possible?
Correct Answer(s)
A. S = Static
B. C = Connected
D. A = Active
Explanation
The possible route statuses are Static, Connected, and Active. Static routes are manually configured by the network administrator and do not change unless manually updated. Connected routes are automatically created by the router when it detects a directly connected network. Active routes are those that are currently being used for forwarding packets. The Drop status is not mentioned in the answer, so it is not a possible route status.
32.
Wireless clients (mode=station) will work properly if bridged to the ethernet.
Correct Answer
B. False
Explanation
Wireless clients (mode=station) will not work properly if bridged to the ethernet. This is because when a wireless client is bridged to the ethernet, it essentially becomes a part of the wired network and loses its ability to connect to the wireless network. As a result, it will not be able to communicate with other wireless devices or access the internet wirelessly. Therefore, the statement is false.
33.
For static routing functionality, additionally to the RouterOS 'system' package, you will also need the following software package:
Correct Answer
B. No extra package required
Explanation
The correct answer is "no extra package required". This means that for static routing functionality, you do not need any additional software package apart from the RouterOS 'system' package. This implies that the necessary routing functionality is already included in the 'system' package itself, and there is no need to install any other package for static routing.
34.
Simple Queue number 0 defines 2M for upload and download for the target IP 10.10.0.33.
Simple Queue number 1 defines 4M for upload and download for the target IP 10.10.0.33. Client 10.10.0.33 is been able to obtain
Correct Answer
A. 2M upload/download
Explanation
The client with IP address 10.10.0.33 is able to obtain 2M upload/download because Simple Queue number 0 defines 2M for upload and download for that target IP.
35.
For a user in local PPP secrets/PPP profiles database, it is possible to
Correct Answer(s)
A. Allow only pppoe login
D. Allow/deny use of more than one login by this user
Explanation
The given correct answer suggests that in the local PPP secrets/PPP profiles database, it is possible to allow only pppoe login and also allow or deny the use of more than one login by a specific user. This means that the user can only log in using pppoe and can have multiple logins or be restricted to only one login.
36.
Consider the following diagram. We want to communicate from a device on LAN1 to a device on LAN2. Assuming that all necessary configurations are already included on R2, which of the following configurations in R1 would enable this communication?
Correct Answer
B. /ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2
Explanation
The correct answer is "/ip route add dst-address=192.168.1.0/24 gateway=192.168.99.2". This configuration on R1 adds a route for the destination address 192.168.1.0/24 with a gateway of 192.168.99.2. This means that any traffic destined for the devices on LAN2 will be sent to the gateway 192.168.99.2, which is connected to LAN2. This enables communication between the device on LAN1 and the device on LAN2.
37.
You have to connect to a RouterBOARD without any previous configuration. Select all possibilities to connect and do some basic configuration
Correct Answer(s)
A. Serial Connection
B. MAC-Winbox
D. Telnet
Explanation
To connect to a RouterBOARD without any previous configuration, there are three possibilities: Serial Connection, MAC-Winbox, and Telnet. A serial connection involves connecting a computer to the RouterBOARD using a serial cable, allowing for direct communication and configuration. MAC-Winbox refers to using the MAC address of the RouterBOARD to connect and configure it using the Winbox software. Telnet is another option where the RouterBOARD can be accessed and configured remotely using the Telnet protocol. These three methods provide different ways to connect and perform basic configuration on the RouterBOARD.
38.
PPP Secrets are used for
Correct Answer(s)
A. L2TP clients
B. PPP clients
D. PPtP clients
E. PPPoE client
Explanation
PPP Secrets are used for authenticating and authorizing various types of clients in a network. L2TP clients, PPP clients, PPtP clients, and PPPoE clients all require PPP Secrets for establishing a secure connection with the network. These secrets ensure that only authorized clients can access the network resources and prevent unauthorized access. Router users, on the other hand, typically use different authentication methods such as username and password or SSH keys, and do not rely on PPP Secrets for authentication.
39.
Firewall NAT rules process only the first packet of each connection.
Correct Answer
B. FALSE
Explanation
Firewall NAT rules do not only process the first packet of each connection. Instead, they process all packets of a connection based on the defined NAT rules. These rules are responsible for translating the source and/or destination IP addresses and ports of network packets, allowing for proper routing and communication between different networks. Therefore, the correct answer is FALSE.
40.
Using wireless connect-list it’s possible to prioritize connection to one Access Point over another Access Point by changing the order of the entries.
Correct Answer
A. True
Explanation
The given statement is true. Wireless connect-list allows users to prioritize their connection to one Access Point over another by changing the order of the entries. This means that users can specify which Access Point they want to connect to first, ensuring a higher level of preference for that particular Access Point. This feature is useful in situations where multiple Access Points are available, but the user wants to prioritize their connection to a specific one.
41.
What is possible with Netinstall?
Correct Answer
A. MikroTik RouterOS reinstall
Explanation
Netinstall is a tool provided by MikroTik that allows users to reinstall the RouterOS operating system on their MikroTik devices. This can be useful in situations where the RouterOS has become corrupted or is not functioning properly. By using Netinstall, users can easily restore their devices to a working state by reinstalling the RouterOS.
42.
Mark possible TCP states in the connection tracking table.
Correct Answer(s)
A. New
C. Related
D. Invalid
E. Established
Explanation
The given answer correctly identifies the possible TCP states in the connection tracking table. "New" represents a new connection that has been initiated, "Related" indicates a connection that is related to an existing connection, "Invalid" signifies an invalid or unauthorized connection, and "Established" represents a connection that is currently active and established. "Closed" is not included in the answer as it represents a state where the connection has been terminated.
43.
Mark correct statements.
Correct Answer
B. Backup files are not editable
Explanation
Backup files are not editable because they are created as a precautionary measure to safeguard data and restore it in case of any loss or corruption. These files are typically created in a format that cannot be easily modified or edited to prevent accidental changes or tampering with the backup data. Therefore, the statement that backup files are not editable is correct.
44.
/ip route configuration on router,
/ip route add dst-address=0.0.0.0/0 gateway=192.168.0.1
/ip route add dst-address=192.168.1.0/24 gateway=192.168.0.2
/ip route add dst-address=192.168.2.0/24 gateway=192.168.0.3
/ip route add dst-address=192.168.3.0/26 gateway=192.168.0.4
Router needs to send packets to 192.168.3.240. Which gateway will be used?
Correct Answer
B. 192.168.0.1
Explanation
Route 1: dst-address=0.0.0.0/0 with gateway=192.168.0.1 (this is a default route)
Route 2: dst-address=192.168.1.0/24 with gateway=192.168.0.2
Route 3: dst-address=192.168.2.0/24 with gateway=192.168.0.3
Route 4: dst-address=192.168.3.0/26 with gateway=192.168.0.4
The destination IP 192.168.3.240 needs to be checked against each route:
192.168.3.240 does not match 0.0.0.0/0 (default route) specifically, but it is the least specific route.
192.168.3.240 does not fall within 192.168.1.0/24 or 192.168.2.0/24.
Route 4 (192.168.3.0/26) covers the IP range 192.168.3.0 to 192.168.3.63, which does not include 192.168.3.240.
Since none of the specific routes cover 192.168.3.240, the router will fall back to the default route.
Therefore, the gateway 192.168.0.1 will be used.
45.
PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there is a router between server and end-user host, it will not be able to create PPPoE tunnel to that PPPoE server.
Correct Answer
B. False
Explanation
The statement is false because a PPPoE server can work across multiple Ethernet broadcast domains as long as there is a router connecting those domains. The router will forward the PPPoE packets between the server and the end-user host, allowing the creation of a PPPoE tunnel.
46.
To use masquerade, you need to specify
Correct Answer
A. Action=masquerade, out-interface, chain=src-nat
Explanation
The correct answer is "action=masquerade, out-interface, chain=src-nat" because when using masquerade, the action needs to be set as "masquerade" to modify the source IP address of outgoing packets. The "out-interface" parameter specifies the interface that the packets will be going out through, and the "chain=src-nat" parameter indicates that the masquerade action should be applied in the source NAT chain.
47.
You want to use PCQ and allow 256k maximum download and upload for each client. Choose correct argument values for the required queue.
Correct Answer(s)
D. Kind=pcq pcq-rate=256000 pcq-classifier=dst-address
E. Kind=pcq pcq-rate=256000 pcq-classifier=src-address
Explanation
The correct answer is "kind=pcq pcq-rate=256000 pcq-classifier=dst-address,kind=pcq pcq-rate=256000 pcq-classifier=src-address". This is because the question states that the desired maximum download and upload for each client is 256k. Therefore, the pcq-rate should be set to 256000. Additionally, the question does not specify whether the classifier should be based on the destination address or the source address, so both options are valid.
48.
We have two radio cards in a point-to-point link with settings:
Card Nr 1.: mode=ap-bridge ssid="office"
frequency=2447 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa
Card Nr 2.: mode=station ssid="office"
frequency=2412 band=2.4ghz-b/g default-authentication=yes default-forwarding=yes security-profile=wpa2
Is Card Nr2. able to connect to Card Nr 1.?
Correct Answer
C. No. because of the different frequencies
Explanation
Card Nr 2 is not able to connect to Card Nr 1 because they are operating on different frequencies. The frequency of Card Nr 1 is 2447, while the frequency of Card Nr 2 is 2412. In order for two devices to connect in a point-to-point link, they need to be operating on the same frequency.
49.
How long is the level 1 (demo) license valid?
Correct Answer
B. Infinite time
Explanation
The level 1 (demo) license is valid for an infinite amount of time. This means that there is no expiration date or time limit for using the level 1 license. Users can continue to access and utilize the benefits of the license for as long as they need or want to.
50.
Router A and B are both running as PPPoE servers on different broadcast domains of your network Are it possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers?
Correct Answer
B. False
Explanation
It is not possible to set Router A to use "/PPP secret" accounts from Router B to authenticate PPPoE customers. Each router running as a PPPoE server operates on its own broadcast domain and manages its own set of accounts for authentication. The "/PPP secret" accounts are specific to Router B and cannot be accessed or used by Router A for authentication purposes. Therefore, the correct answer is False.