Preguntas Anki
Preguntas Anki
Preguntas Anki
6
7
10
11
12
13
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
PREGUNTAS
You have a DHCP server on your MikroTik router. The IP addresses 10.1.2.2-10.2.2.20 are distributed in the DHCP
network. Additionally, 3 static IP address are defined for your servers: 10.1.2.31-10.1.2.33. (T/F)
After a while 20 more IP addresses need to be distributed in the network. It is possible to distribute the extra IP
address without adding another DHCP Server:
What wireless card can we use to achieve 100 Mbps actual wireless throughput?
Using wireless connect-list it's possible to prioritize connection to one Access Point over another Access Point by
changing the order of the entries. (T/F)
In a network with dozens of switches, how many root bridges would you have?
For a Simple Queue to apply a bandwidth restrictions on a bridged interface, following must be done:
What is the minimum hardware required to run the CHR(Cloud Hosted Router)?
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
What protocols are used to configure trunking on a switch? 1 /VLAN Trunking Protocol
2/VLAN
3/802.1Q
4/ISL
In which situations can Netinstall NOT be used to install a RouterBOARD?
How long do you have to enter a valid license key on an x86 installation?
What command will output the license level and product key in RouterOS?
. What is the most appropriate RouterOS release channel for production router devices?
What commands are used to download and install software updates in RouterOS?
A network-ready device is directly connected to a MikroTik RouterBOARD 750 with a correct U.T.P. RJ45
functioning cable. The device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of
255.255.255.252. What will be a valid IPv4 address for the RouterBOARD 750 for a successful connection to the
device?
It is possible to use WPA and WPA2 authentication type at the same time with
one security profile.
Is it possible to limit how many clients are able to connect to an access point?
B.
No extra package required
C.
Routing
D.
Advanced-tools
We have two radio cards in a point-to-point link with settings: Card Nr 1.:
mode=ap-bridge ssid="office" frequency=2447 band=2.4ghz-b/g default-
authentication=yes default-forwarding=yes security-profile=wpa Card Nr 2.:
mode=station ssid="office" frequency=2412 band=2.4ghz-b/g default-
authentication=yes default-forwarding=yes security-profile=wpa2 Is Card Nr2.
able to connect to Card Nr 1.?
You want to use PCQ and allow 256k maximum download and upload for each
client. Choose correct argument values for the required queue.
To use masquerade, you need to specify
You have 802.11b/g wireless card. What frequencies are available to you?
Which is correct masquerade rule for 192.168.0.0/24 network on the router with
outgoing interface=ether1?
Can you manually add drivers to RouterOS in case your PCI Ethernet card is not
recognized, and it's a driver issue?
What kind of users are listed in the Secrets window of the PPP menu?
To make all DNS request coming from your network to resolve on your router
(regardless of clients configuration), which action would you specify for the DST-
NAT rule?
Which is a default baud-rate of currently manufactured RouterBOARDs?
If you need to make sure that one computer in your Hotspot network can access
the internet without Hotspot authentication, which menu allows you to do this?
A MikoTik PPPoE Server can be used only within a broadcast domain, that is,
users can not run PPPoE protocol with a server if there is a router between the
customer and that PPPoE server. *
To limit wireless access for your HotSpot users
To block access to web proxies running on TCP port 8080, you have to create a
firewall rule and specify:
Which option in the configuration of a wireless card must be disabled to cause
the router to permit ONLY known clients listed in the access
Mark possible TCP states in the connection tracking table
When sending out an ARP request, an IP host is expecting what kind of address
for an answer?
You wish to secure your RouterOS system. You do not want the RouterOS to be
discoverable using MNDP or CDP. You also want to deny management via the
MAC addresses on all interfaces. Select the correct actions to accomplish this
What is the correct action for a NAT rule on a router that should intercept SMTP
traffic and send it over to a specified mail server?
To be able to do NAT the connection tracking does not need to be enabled
What is the correct action to be specified in the NAT rule to hide a private
network when communicating to the outside world?
You can not use OSPF and RIP routing protocols simultaneously on the
RouterOS.
What does a VLAN do?
False
802.11 b/g
False or not
The Cloud Hosted Router (CHR) is a pre-rolled virtual RouterOS installation purpose-built for
virtualization.
The CHR is distributed in virtual disk formats like .vmdk and .vdi.
The minimum hardware required to run the CHR includes a 64-bit CPU with virtualization
support, 128 MB RAM, and 128 MB hard disk space.
A Level 1 Demo license for RouterOS can be requested for free via the MikroTik client portal.
Host-to-Host
Some restrictions applied to demo license keys include limited connections for tunnels, no
wireless support, no included version upgrades, no included support from MikroTik, and not
being eligible for resale.
Levels 4 and 5 licensed routers can function as infrastructure devices and APs in WISP and
Enterprise environments, but the number of supported features varies based on the license
level.
The CHR virtual image is licensed out-of-the-box as a fully functional router, but all interfaces
are limited to 1Mb/sec speeds until a valid license key is entered.
3 and 4
The router is connected only to a wireless network / The router is connected only to a
secondary Ethernet port
DNS
24 hours
128 MB
Current
Additional packages can be installed to add more advanced features like MPLS, IPv6,
CALEA, etc.
The "Security" package includes software for encrypted connections such as IPSEC, SSH,
among others.
The commands "/system package update download" and "/system package update install"
are used to download and install software updates in RouterOS.
192.168.100.69/255.255.255.252
510
4094
/system scheduler
True
Yes, but only with access-lists
False
24 Hrs
2412MHz / 2422MHz
B.Exports full configuration of the router C. Exports only part of
the configuration (for example /ip firewall) D. Exports scripts from
/system script
ip firewall nat add action=masquerade chain=srcnat // ip firewall
nat add action=masquerade chain=srcnat src-
address=192.168.0.0/24 // /ip firewall nat add
action=masquerade chain=srcnat out-interface=ether1
NO
Redirect
115200
false
IP bindings o
False
new
B. TCP/8291
FALSE
A. 60 B. 30 D. 64
ip hotspot walled-garden
D, A, C
target-address, max-limit
False
False
bridge1
B. Hotspot configuration
Access List
system
Forwards any TCP traffic incoming through ether1 port 3389 to
the port 81 of the internal host 192.168.1.2
FIFO - First In First Out (for Bytes or for Packets) / SFQ -
Stochastic Fairness Queuing // RED - Random Early Detect (or
Drop) // PCQ - Per Connection Queuing
true
Create MAC Address restriction on HotSpot user login // Create
MAC Address restriction in the Wireless Access List
"chain", "action", "protocol", "port"
Default Authenticate O Enable Access List
MAC Address
8192
FALSE
TCP 1723
True
By interface name
superchannel
A route between the NAT Router and the webserver must exist //
D. in ip firewall NAT there should be a dst-nat between the public
ip of the router and the private ip of the webserver
PPPoE clients B. L2TP clients , PPtP clients
2
DNS
bootp
masquerade
Connect List
false
NO
ip Hot-Spot walled-garden
Authenticated
A. Transparent DNS Cache
D. Transparent HTTP Proxy
. Create MAC Address restriction on HotSpot user login // Create
MAC Address restriction in the Wireless Access List
A. Mangle
C. Queue Tree
D. Address-list
EXPLICACION