Which type of encryption could be used to establish a connection with a simple passkey without using a 802.1X authentication server?
Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
NAT rule is going to catch SMTP traffic and send it to a specific mail server.
What is the correct action for a NAT rule?
When backing up your router by using the ‘Export’ command, the following happens:
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?
Which statements are true regarding ICMP packets?
ICMP guarantees datagram delivery.
ICMP can provide hosts with information about network problems.
ICMP is encapsulated within IP datagrams.
ICMP is encapsulated within UDP datagrams.
A DHCP server is configured on a LAN interface which is a port on a bridge. The DHCP server does not start. What could be the reason(s)?
Which firewall chain should you use to filter clients HTTP traffic going through the router?
Evaluate the following information:
Access Point configuration:
-- wlan1 is in 'AP-Bridge' mode
-- Bridge1 has wlan1 and ether1 as ports
CPE configuration:
-- wlan1 is in 'Station-Bridge' mode
-- Bridge1 has wlan1 and ether1 as ports
Select protocols that will pass from ether1 on the CPE to ether1 on the Access Point.
Select minimal set of software packages in RouteOS required to configuring a wireless AP
Where can you monitor (see addresses and ports) real-time connections which are
processed by the router?
Which class of IP address provides a maximum of only 254 host addresses per network ID?
A network ready device is directly connected to a MikroTik RouterBOARD 750 with a correct U.T.P. RJ45 functioning cable. The device is configured with an IPv4 address of 192.168.100.70 using a subnet mask of
255.255.255.252. What will be a valid IPv4 address for the RouterBOARD 750 for a successful connection to the device?
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized