Second, I will go with this being a test configuration.
ip firewall filter
Incomplete at best, for example it permits DNS requests on the WAN interface, which means anyone can query your device for DNS which is not recommended.
You block ping from all interfaces, including the local ones, which is counterproductive.
You are not blocking winbox (enabled as a service) from any source, it is reachable on the WAN interface, which is a big no-no. Similarly, you are not blocking ssh.
I don’t see any forward rules, likely you are not filtering anything either way.
ip service
You should restrict the allowed sources for whatever is needed. For example winbox is permitted but not restricted.
time
No ntp server set. Consider adding one to make sure your device is time synced.
Other than that, either you amputated the configuration or it is missing a ton of things, for example there is no interface list, where the default has WAN and LAN.
It seems to me like you have no (sensible) firewall filter rules. This can be very dangerous, your router (and network) is essentially open from the outside.
On the other hand you have some not-so-common more advanced settings (ovpn. queues, etc.).
It seems like it was configured by someone familiar with Ros and then “mutilated” by someone else (I cannot believe that a knowledgeable user would leave a router open like yours).
Check the advice given here: http://forum.mikrotik.com/t/am-i-using-soho-firewall-or-not/180401/1
for some needed firewall rules settings.