Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

MTCNA MikroTikCertified Network Associate Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your MikroTik MTCNA MikroTikCertified Network Associate Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 110 questions

On the advanced menu of the wireless setup there is a parameter called “Area”, it works directly with:

A.

Connect List

B.

Access List

C.

None of these

D.

Security Profile

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

A.

Application

B.

Host-to-Host

C.

Internet

D.

Network Access

Destination NAT (chain dstnat, action dst-nat) can be used to:

A.

Change destination port

B.

Direct users from the Internet to a server within your local network

C.

Change source port

D.

Hide your local network from the Internet

If you wish to block user access to MSN messenger, which chain should the firewall rule be placed in?

A.

input

B.

process

C.

forward

D.

output

From which of the following locations can you obtain Winbox?

A.

Router’s webpage

B.

Files menu in your router

C.

Via the console cable

D.

mikrotik.com

In which order are the entries in Access List and Connect List processed?

A.

By Signal Strength Range

B.

In sequence order

C.

In a random order

D.

By interface name

Choose all valid host address ranges for subnet 15.242.55.62/27

A.

15.242.55.33 – 15.242.55.62

B.

15.242.55.32 – 15.242.55.63

C.

15.242.55.31 – 15.242.55.62

D.

15.242.55.33 – 15.242.55.63

Which type of encryption could be used to establish a connection with a simple passkey without using a 802.1X authentication server?

A.

WPA PSK/WPA2 PSK

B.

WPA EAP/WPA2 EAP

What is the main reason the OSI model was created?

A.

To create a layered model larger than the DoD model.

B.

So application developers can change only one layer's protocols at a time.

C.

So different networks could communicate.

D.

So Cisco could use the model.

If you need to make sure that one computer in your Hot-Spot network can access the Internet without Hot-Spot authentication, which menu allows you to do this?

A.

Users

B.

IP bindings

C.

Walled-garden

D.

Walled-garden IP

What is marked by connection-state=established matcher?

A.

Packet belongs to an existing connection, for example a reply packet or a packet which belongs to already replied connection

B.

Packet is related to, but not part of an existing connection

C.

Packet does not correspond to any known connection

D.

Packet begins a new TCP connection

There are two wireless cards (wlan1 and wlan2) which are bridged together. On wlan1 card thereis a setting "Forwarding=no". Choose the correct answer(s):

A.

Stations on wlan2 will be able to communicate with stations on wlan2

B.

Stations on wlan2 will be able to communicate with stations on wlan1

C.

Stations on wlan1 will be able to communicate with stations on wlan1

D.

To prevent communication between wlan1 and wlan2 one cannot use Bridge Filters

E.

Stations on wlan1 will be able to communicate with stations on wlan2

To block communications between wireless clients connected to the same access point interface, you should set:

A.

'default-forwarding=no'

B.

'max-station-count=1'

C.

'default-authentication=no'

D.

'default-authentication=no' and 'default-forwarding=no'

What is the default TTL (time to live) on a router that an IP packet can experience before it will be discarded?

A.

60

B.

30

C.

1

D.

64

What is the minimal possible wireless configuration to create an Access Point?

A.

radio name

B.

scan-list

C.

frequency

D.

band

E.

ssid

F.

DFS mode

G.

WDS

RouterOS log messages are stored on disk by default

A.

True

B.

False

The correct order for PPPoE discovery stage is:

A.

Initialization, Session confirmation, Request and Offer

B.

Initialization, Offer, Request and Session confirmation

C.

Request, Initialization, Session confirmation and Offer

D.

Request, Offer, Initialization and Session confirmation

Is it possible to limit how many clients are able to connect to an access point?

A.

No it's not possible at all

B.

Yes, but only with access-lists

C.

Yes

You want to transfer existing '/ip firewall filter' configuration from one router to a new system.

Choose the best possible way to do:

A.

Export only '/ip firewall filter'

B.

Create backup only of '/ip firewall filter' rules

C.

Create backup, edit backup file and restore on target router

D.

Export global configuration and remove everything apart from '/ip firewall filter'

Select valid subnet masks:

A.

255.192.0.0

B.

255.255.192.255

C.

192.0.0.0

D.

255.255.224.0

Page: 1 / 2
Total 110 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved