Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CloudNetX > CNX-001

CNX-001 CompTIA CloudNetX Exam Question and Answers

Question # 4

A company is replacing reserved public IP addresses with dynamic IP addresses. The network architect creates a list of assets with some dependencies to these reserved IPs:

(Refer to image: Reserved IPs are in use by NSGs, VMs, load balancers, and one is unallocated.)

Which of the following issues may begin to affect cloud assets after the replacement is made?

A.

IP asymmetric routing

B.

IP spoofing

C.

IP exhaustion

D.

IP reuse

Full Access
Question # 5

A global company has depots in various locations. A proprietary application was deployed locally at each of the depots, but issues with getting the consolidated data instantly occurred. The Chief Information Officer decided to centralize the application and deploy it in the cloud. After the cloud deployment, users report the application is slow. Which of the following is most likely the issue?

A.

Throttling

B.

Overutilization

C.

Packet loss

D.

Latency

Full Access
Question # 6

An organization wants to evaluate network behavior with a network monitoring tool that is not inline. The organization will use the logs for further correlation and analysis of potential threats. Which of the following is the best solution?

A.

Syslog to a common dashboard used in the NOC

B.

SNMP trap with log analytics

C.

SSL decryption of network packets with preconfigured alerts

D.

NetFlow to feed into the SIEM

Full Access
Question # 7

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

A.

Establish a plan of action to resolve the issue.

B.

Test the theory to determine cause.

C.

Document lessons learned.

D.

Implement the solution.

Full Access
Question # 8

A network administrator is troubleshooting an outage at a remote site. The administrator examines the logs and determines that one of the internet links at the site appears to be down. After the service provider confirms this information, the administrator fails over traffic to the backup link. Which of the following should the administrator do next?

A.

Document the lessons learned.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Verify full system functionality.

Full Access
Question # 9

A cloud architect must recommend an architecture approach for a new medical application that requires the lowest downtime possible. Which of the following is the best application deployment strategy given the high-availability requirement?

A.

Two different availability zones (per region) using an active-active topology in two different regions

B.

Four different availability zones using an active-passive topology in a single region

C.

Four different availability zones using an active-active topology in a single region

D.

Two different availability zones (per region) using an active-passive topology in two different regions

Full Access
Question # 10

A network architect is designing a new network for a rural hospital system. Given the following requirements:

    Highly available

    Consistent data transmission

    Resilient to simultaneous failures

Which of the following topologies should the architect use?

A.

Collapsed core

B.

Hub-and-spoke

C.

Mesh

D.

Star

Full Access
Question # 11

A company is experiencing numerous network issues and decides to expand its support team. The new junior employees will need to be onboarded in the shortest time possible and be able to troubleshoot issues with minimal assistance. Which of the following should the company create to achieve this goal?

A.

Statement of work documenting what each junior employee should do when troubleshooting

B.

Clearly documented runbooks for networking issues and knowledge base articles

C.

Physical and logical network diagrams of the entire networking infrastructure

D.

A mentor program for guiding each junior employee until they are familiar with the networking infrastructure

Full Access
Question # 12

A network architect needs to build a new data center for a large company that has business units that process retail financial transactions. Which of the following information should the architect request from the company?

A.

Regulatory requirements

B.

Statement of work

C.

Business case study

D.

Internal reference architecture

Full Access
Question # 13

A SaaS company is launching a new product based in a cloud environment. The new product will be provided as an API and should not be exposed to the internet. Which of the following should the company create to best meet this requirement?

A.

A transit gateway that connects the API to the customer's VPC

B.

Firewall rules allowing access to the API endpoint from the customer's VPC

C.

A VPC peering connection from the API VPC to the customer's VPC

D.

A private service endpoint exposing the API endpoint to the customer's VPC

Full Access
Question # 14

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

A router on the same network shows the following output:

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Full Access
Question # 15

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

Full Access
Question # 16

Throughout the day, a sales team experiences videoconference performance issues when the accounting department runs reports. Which of the following is the best solution?

A.

Running the accounting department's reports outside of business hours

B.

Using a load balancer to split the video traffic evenly

C.

Configuring QoS on the corporate network switches

D.

Increasing the throughput on the network by purchasing high-end switches

Full Access
Question # 17

A network architect must ensure only certain departments can access specific resources while on premises. Those same users cannot be allowed to access those resources once they have left campus. Which of the following would ensure access is provided according to these requirements?

A.

Enabling MFA for only those users within the departments needing access

B.

Configuring geofencing with the IPs of the resources

C.

Configuring UEBA to monitor all access to those resources during non-business hours

D.

Implementing a PKI-based authentication system to ensure access

Full Access
Question # 18

A user reports an issue connecting to a database server. The front-end application for this database is hosted on the company's web server. The network engineer has changed the network subnet that the company servers are located on along with the IP addresses of the servers. These are the new configurations:

    New subnet for the servers is 10.10.10.64/27

    Web server IP address is 10.10.10.101

    Database server IP is 10.10.10.93

Which of the following is most likely causing the user's issue?

A.

The web application server is not forwarding the requests.

B.

The database server firewall is blocking the port to the database.

C.

The DNS server is not resolving properly.

D.

The web server does not have the correct network configuration.

Full Access
Question # 19

A company hosts its applications on the cloud and is expanding its business to Europe. Thecompany must comply with General Data Protection Regulation (GDPR) to limit European customers' access to data. The network team configures the firewall rules but finds that some customers in the United States can access data hosted in Europe. Which of the following is the best option for the network team to configure?

A.

SASE

B.

Network security groups

C.

CDN

D.

Geofencing rule

Full Access
Question # 20

A network engineer is setting up guest access on a Wi-Fi network. After a recent network analysis, the engineer discovered that a user could access the guest network and attack the corporate network, since the networks share the same VLAN. Which of the following should the engineer do to prevent an attack like this one from happening?

A.

Configure Layer 2 client isolation for the wireless network.

B.

Set up a MAC filtering rule and add the MAC addresses of all corporate devices to the allow list.

C.

Set up a strong password on the guest wireless network.

D.

Set up a captive portal so all guest users have to register before gaining access to the wireless network.

Full Access
Question # 21

A customer asks a MSP to propose a ZTA (Zero Trust Architecture) design for its globally distributed remote workforce. Given the following requirements:

    Authentication should be provided through the customer's SAML identity provider.

    Access should not be allowed from countries where the business does not operate.

    Secondary authentication should be added to the workflow to allow for passkeys.

    Changes to the user's device posture and hygiene should require reauthentication into the network.

    Access to the network should only be allowed to originate from corporate-owned devices.

Which of the following solutions should the MSP recommend to meet the requirements?

A.

Enforce certificate-based authentication.

Permit unauthenticated remote connectivity only from corporate IP addresses.

Enable geofencing.

Use cookie-based session tokens that do not expire for remembering user log-ins.

Increase RADIUS server timeouts.

B.

Enforce posture assessment only during the initial network log-on.

Implement RADIUS for SSO.

Restrict access from all non-U.S. IP addresses.

Configure a BYOD access policy.

Disable auditing for remote access.

C.

Chain the existing identity provider to a new SAML.

Require the use of time-based one-time passcode hardware tokens.

Enable debug logging on the VPN clients by default.

Disconnect users from the network only if their IP address changes.

D.

Configure geolocation settings to block certain IP addresses.

Enforce MFA.

Federate the solution via SSO.

Enable continuous access policies on the WireGuard tunnel.

Create a trusted endpoints policy.

Full Access
Question # 22

Application development team users are having issues accessing the database server within the cloud environment. All other users are able to use SSH to access this server without issues. The network architect reviews the following information to troubleshoot the issue:

Traceroute output from an application developer's machine with the assigned IP 192.168.2.7:

    Application development gateway: 192.168.2.1/24

    Server segment gateway: 192.168.1.1/24

    Database server: 192.168.1.9

    Application developer machine IP: 192.168.2.7

    Traceroute ends at hop 4: 192.168.4.1 (server segment firewall), then times out

Which of the following is the most likely cause of the issue?

A.

The core firewall is blocking the traffic.

B.

Network security groups do not have the correct outbound rule configured.

C.

The server segment firewall is dropping the traffic.

D.

The server segment gateway is having bandwidth issues.

Full Access
Question # 23

An administrator logged in to a cloud account on a shared machine but forgot to log out after the session ended. Which of the following types of security threats does this action pose?

A.

IP spoofing

B.

Zero-day

C.

On-path attack

D.

Privilege escalation

Full Access
Question # 24

A company provides an API that runs on the public cloud for its customers. A fixed number of VMs host the APIs. During peak hours, the company notices a spike in usage that results in network communication speeds slowing down for all customers. The management team has decided that access for all customers should be fair and accessible at all times. Which of the following is the most cost-effective way to address this issue?

A.

Use an allow list for customers using APIs.

B.

Increase the number of VMs running APIs.

C.

Enable throttling on APIs.

D.

Increase the MTU on the VMs.

Full Access
Question # 25

A network administrator must connect a remote building at a manufacturing plant to the main building via a wireless connection. Which of the following should the administrator choose to get the greatest possible range from the wireless connection? (Choose two.)

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

Omnidirectional antenna

E.

Patch antenna

F.

Built-in antenna

Full Access