Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

It is possible to create a configuration where VLAN and PPTP interfaces are bridged together.

A.

TRUE

B.

FALSE

Full Access
Question # 5

Which are necessary sections in /queue simple to set bandwidth limitation?

A.

target-address, max-limit

B.

target-address, dst-address, max-limit

C.

target-address, dst-address

D.

max-limit

Full Access
Question # 6

A client uses a RouterBOARD1000. The clock is configured in '/system clock'. The clock resets to default after each reboot.

Select the best solution for the problem.

A.

Write a script in '/system script' to set the clock

B.

Configure '/system ntp server' and set a valid and reachable NTP client address

C.

Configure '/system ntp client' and set a valid and reachable NTP server address

D.

Open the router and ensure the CMOS battery is fine

Full Access
Question # 7

If 'check-gateway' is enabled for an ECMP route and one of the gateways is unreachable, then:

A.

ECMP is going to send packets to all gateways even if one is unreachable

B.

The unreachable gateway is not going be used in Round Robin algorithm

C.

The ECMP route becomes inactive

Full Access
Question # 8

Mangle Routing (routing-mark) is possible, by using chains:

A.

prerouting and output

B.

forward and output

C.

prerouting and forward

D.

input and output

E.

forward and postrouting

Full Access
Question # 9

MAC layer by OSI model is also known as

A.

Layer 2

B.

Layer 1

C.

Layer 6

D.

Layer 7

E.

Layer 3

Full Access
Question # 10

MikroTik RouterOS commands can be run once a day by:

A.

/system watchdog

B.

/system cron

C.

/system scheduler

Full Access
Question # 11

For static routing functionality, additionally to the RouterOS 'system' package, you will also need the following software package:

A.

no extra package required

B.

advanced-tools

C.

routing

D.

dhcp

Full Access
Question # 12

Firewall NAT rules process only the first packet of each connection.

A.

True

B.

False

Full Access
Question # 13

Which statements are true regarding ICMP packets?

    ICMP guarantees datagram delivery.

    ICMP can provide hosts with information about network problems.

    ICMP is encapsulated within IP datagrams.

    ICMP is encapsulated within UDP datagrams.

A.

1 only

B.

2 and 3

C.

1 and 4

D.

All of the above

Full Access
Question # 14

Mark all the features that can be used for limiting client registrations to your access point:

A.

access-list

B.

wpa

C.

WDS

D.

registration-table

Full Access
Question # 15

To connect your MikroTik router to a wireless access point, you have to:

A.

Use the same SSID as on accesspoint

B.

Use the same Radio Name

C.

Use the same Band (5 GHz, 2.4 GHz, ...)

Full Access
Question # 16

The basic unit of a physical network (OSI Layer 1) is the:

A.

Frame

B.

Bit

C.

Byte

D.

Header

Full Access
Question # 17

Domain Name System (DNS) requests can use protocol/port:

A.

UDP

B.

TCP port 53

Full Access
Question # 18

Choose all valid host address ranges for subnet 15.242.55.62/27

A.

15.242.55.33 – 15.242.55.62

B.

15.242.55.32 – 15.242.55.63

C.

15.242.55.31 – 15.242.55.62

D.

15.242.55.33 – 15.242.55.63

Full Access
Question # 19

What is the correct action to be specified in the NAT rule to hide a private network when communicating to the outside world?

A.

masquerade

B.

allow

C.

passthrough

D.

tarpit

Full Access
Question # 20

Where is a hub specified in the OSI model?

A.

Session layer

B.

Physical layer

C.

Data Link layer

D.

Application layer

Full Access
Question # 21

To use masquerade, you need to specify:

A.

action=accept, out-interface, chain=src-nat

B.

action=masquerade, out-interface, chain=src-nat

C.

action=masquerade, in-interface, chain=src-nat

D.

action=masquerade, out-interface, chain=dst-nat

Full Access
Question # 22

/interface wireless access-list is used for:

A.

Handles a list of Client's MAC Address to permit/deny connection to AP

B.

Shows a list of Client's MAC Address that are already registered at AP

C.

Contains the security profiles settings

D.

Authenticate Hot-Spot users

Full Access
Question # 23

It is possible to create an encrypted PPPoE tunnel in RouterOS:

A.

True

B.

False

Full Access
Question # 24

Which router command allows you to view the entire contents of all access lists?

A.

show all access-lists

B.

show access-lists

C.

show ip interface

D.

show interface

Full Access
Question # 25

Which of these are possible solutions to bridge two networks over a wireless link:

A.

Both devices in AP mode and enable WDS mode

B.

One device in AP mode, another one in station-pseudobridge-clone

C.

One device in AP mode, another one in station-pseudobridge

D.

One device in AP mode, another one in station

Full Access
Question # 26

PPPoE server only works within one Ethernet broadcast domain that it is connected to. If there is a router between server and end-user host, it will not be able to create PPPoE tunnel to that PPPoE server.

A.

False

B.

True

Full Access
Question # 27

Is ARP used in the IPv6 protocol?

A.

False

B.

True

Full Access
Question # 28

Is ARP used in the IPv6 protocol?

A.

True

B.

False

Full Access
Question # 29

Which firewall chain should you use to filter clients' HTTP traffic going through the router?

A.

prerouting

B.

forward

C.

output

D.

input

Full Access
Question # 30

Mark all features that are compatible with Nstreme

A.

WDS between a device in station-wds mode and a device in station-wds mode

B.

Encryption

C.

WDS between a device in ap-bridge mode with a device in station-wds mode

D.

Bridging a device in station mode with a device in ap-bridge mode

Full Access
Question # 31

Which of the following is NOT a valid MAC Address?

A.

80:GF:AA:67:13:5D

B.

95:B5:DD:EE:78:8A

C.

88:0C:00:99:5F:EF

D.

EA:BA:AA:EE:FF:CB

E.

13:16:86:53:89:43

Full Access
Question # 32

What is the default protocol/port of (secure) winbox?

A.

UDP/5678

B.

TCP/22

C.

TCP/8291

D.

TCP/8080

Full Access
Question # 33

Is action=masquerade allowed in chain=dstnat?

A.

yes, but only if dst-addr is specified

B.

yes

C.

yes, but it works only for incoming connections

D.

no

Full Access