Jak Začít?

Máš v počítači zápisky z přednášek
nebo jiné materiály ze školy?

Nahraj je na studentino.cz a získej
4 Kč za každý materiál
a 50 Kč za registraci!




BHWS-otázky-a-odpovědi-zápočet-1

DOCX
Stáhnout kompletní materiál zdarma (88.91 kB)

Níže je uveden pouze náhled materiálu. Kliknutím na tlačítko 'Stáhnout soubor' stáhnete kompletní formátovaný materiál ve formátu DOCX.

H. mode

  1. What is marked by connection-state=established matcher

A. Packet begins a new TCP connection

B. Packet does not correspont do any known connection

C. Packet is related to, but not part of an existing connection

D. Packet belongs to an existing connection, for example a reply packet or a packet

  1. There are two routes in the routing table

0 dst-addr=10.1.1.0/24 gateway=5.5.5.5

1 dst-addr=10.1.1.4/24 gateway=5.6.6.6

Which gateway will be used to get to the IP adress 10.1.1.6

A. both, half of the traffic will be routed through one gateway, half through the other

B. the required route is not in the routing table

C. 5.5.5.5

D. 5.6.6.6

  1. Hotspot ip-binding is used to allow access to Internet web servers specifing the IP address of the web server instead of the URL

True

  1. When viewing the routes in Winbox, some routes will show „DAC“ in the first collumn:

A. Dynamic, Available, Created

B. Dynamic, Active, Console

C. Direct, Available, Connected

D. Dynamic, Active, Connected

  1. You have a wireless interface with SSID=“WAN1“ mode=“ap-bridge“ and a VirtualAP with SSID=“VAP1“ on the router. Is it possible to use nstreme protocol.

A. No, Nstreme can not be used on wireless interface if a VirtualAP is on it

B. Yes, but Nstreme can be used only for SSID=VAP1

C. Yes, but Nstreme can be used only for SSID=WLAN1

D. Yes, Nstreme can be used for both SSIDs

  1. /store allows you to save to external disk

A. web-proxy data

B. system configuration

C. dude data

D. User-Manager data

  1. You need to redirect a browser page from search of „xxx“ in google to another website.

For example: www.mikrotik.com

Choose correct proxy access rule

A. /ip proxy access add dst-host=*.google.* path=*xxx* action=deny redirectto=www.mikrotik.com

B. /ip proxy access add path=*xxx* action=allow redirect-to=www.mikrotik.com

C. /ip proxy access add dst-host=*xxx* action=allow redirect-to=www.mikrotik.com

D. /ip proxy access add dst-host=*xxx* action=deny redirect-to=www.mikrotik.com

  1. Collisions are possible in full-duplex Ethernet networks

False

  1. Which rule is used to block SMTP protocol from Lan interface for clients

A. /ip firewall filter add chain=forward protocol=tcpdst-port=25 action=drop in-interface=Lan

B. /ip firewall filter add chain=input protocol=tcp dst-port=25 action=drop in-interface=Lan

C. /ip firewall filter add chain=forward dst-port=25 action=drop in-interface=Lan

D. /ip firewall filter add chain=output protocol=tcpdst-port=25 action=drop in-interface=Lan

  1. A client uses a RouterBoard1000. The clock is configured in „/system clock“. The clock resets to default after each reboot.Select the best solution for the problem.

A. Configure '/system ntp server' and set a valid and reachable NTP client address.

B. Configure '/system ntp client' and set a valid and reachable NTP server address.

C. Write a script in '/system script' to set the clock

D. Open the router and ensure the CMOS battery is fine.

  1. Define a routing loop

A. situation where the TTL of the packet expires

Témata, do kterých materiál patří