Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

CompTIA CNX-001 Dumps

Page: 1 / 8
Total 84 questions

CompTIA CloudNetX Exam Questions and Answers

Question 1

A network administrator is configuring firewall rules to lock down the network from outside attacks. Which of the following should the administrator configure to create the most strict set of rules?

Options:

A.

URL filtering

B.

File blocking

C.

Network security group

D.

Allow List

Question 2

New devices were deployed on a network and need to be hardened.

INSTRUCTIONS

Use the drop-down menus to define the appliance-hardening techniques that provide themostsecure solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

Options:

Question 3

A SaaS company's new service currently is being provided through four servers. The company's end users are having connection issues, which is affecting about 25% of the connections. Which of the following is most likely the root cause of this issue?

Options:

A.

The service is using round-robin load balancing through a DNS server with one server down.

B.

The service is using weighted load balancing with 40% of the traffic on server A, 20% on server B, 20% on server C, and server D is down.

C.

The service is using a least-connection load-balancing method with one server down.

D.

Load balancing is configured with a health check in front of these servers, and one of these servers is unavailable.

Question 4

An administrator needs to add a device to the allow list in order to bypass user authentication of an AAA system. The administrator uses MAC filtering and needs to discover the device's MAC address to accomplish this task. The device receives an IP address from DHCP, but the IP address changes daily. Which of the following commands should the administrator run on the device to locate its MAC address?

Options:

A.

ipconfig /all

B.

netstat -an

C.

arp -a

D.

nslookup

Question 5

An administrator must ensure that credit card numbers are not contained in any outside messaging or file transfers from the organization. Which of the following controls meets this requirement?

Options:

A.

Intrusion detection system

B.

Egress filtering

C.

Data loss prevention

D.

Encryption in transit

Question 6

An organization wants to evaluate network behavior with a network monitoring tool that is not inline. The organization will use the logs for further correlation and analysis of potential threats. Which of the following is the best solution?

Options:

A.

Syslog to a common dashboard used in the NOC

B.

SNMP trap with log analytics

C.

SSL decryption of network packets with preconfigured alerts

D.

NetFlow to feed into the SIEM

Question 7

Throughout the day, a sales team experiences videoconference performance issues when the accounting department runs reports. Which of the following is the best solution?

Options:

A.

Running the accounting department's reports outside of business hours

B.

Using a load balancer to split the video traffic evenly

C.

Configuring QoS on the corporate network switches

D.

Increasing the throughput on the network by purchasing high-end switches

Question 8

A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0/8. Which of the following is the best solution?

Options:

A.

Allocate 10.1.0.0/30 to the IT department. Allocate 10.2.0.0/16 to the sales department.

B.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/24 to the sales department.

C.

Allocate 10.1.0.0/22 to the IT department. Allocate 10.2.0.0/15 to the sales department.

D.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/25 to the sales department.

Question 9

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

Options:

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Question 10

A network administrator must connect a remote building at a manufacturing plant to the main building via a wireless connection. Which of the following should the administrator choose to get the greatest possible range from the wireless connection? (Choose two.)

Options:

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

Omnidirectional antenna

E.

Patch antenna

F.

Built-in antenna

Question 11

A call center company provides its services through a VoIP infrastructure. Recently, the call center set up an application to manage its documents on a cloud application. The application is causing recurring audio losses for VoIP callers. The network administrator needs to fix the issue with the least expensive solution. Which of the following is the best approach?

Options:

A.

Adding a second internet link and physically splitting voice and data networks into different routes

B.

Configuring QoS rules at the internet router to prioritize the VoIP calls

C.

Creating two VLANs, one for voice and the other for data

D.

Setting up VoIP devices to use a voice codec with a higher compression rate

Question 12

A network engineer identified several failed log-in attempts to the VPN from a user's account. When the engineer inquired, the user mentioned the IT help desk called and asked them to change their password. Which of the following types of attacks occurred?

Options:

A.

Initialization vector

B.

On-path

C.

Evil twin

D.

Social engineering

Question 13

A network security administrator needs to set up a solution to:

    Gather all data from log files in a single location.

    Correlate the data to generate alerts.

Which of the following should the administrator implement?

Options:

A.

Syslog

B.

Event log monitoring

C.

Log management

D.

SIEM

Question 14

A network architect is designing a solution to secure the organization's applications based on the security policy. The requirements are:

    Users must authenticate using one set of credentials.

    External users must be located in authorized sites.

    Session timeouts must be enforced.

    Network access requirements should be changed as needed.

Which of the following best meet these requirements? (Choose two.)

Options:

A.

Role-based access

B.

Single sign-on

C.

Static IP allocation

D.

Multifactor authentication

E.

Conditional access policy

F.

Risk-based authentication

Question 15

A network architect needs to build a new data center for a large company that has business units that process retail financial transactions. Which of the following information should the architect request from the company?

Options:

A.

Regulatory requirements

B.

Statement of work

C.

Business case study

D.

Internal reference architecture

Question 16

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

Options:

A.

Secure web gateway

B.

Transit gateway

C.

Virtual private network

D.

Intrusion prevention system

E.

Network access control system

Question 17

A SaaS company is launching a new product based in a cloud environment. The new product will be provided as an API and should not be exposed to the internet. Which of the following should the company create to best meet this requirement?

Options:

A.

A transit gateway that connects the API to the customer's VPC

B.

Firewall rules allowing access to the API endpoint from the customer's VPC

C.

A VPC peering connection from the API VPC to the customer's VPC

D.

A private service endpoint exposing the API endpoint to the customer's VPC

Question 18

Security policy states that all inbound traffic to the environment needs to be restricted, but all external outbound traffic is allowed within the hybrid cloud environment. A new application server was recently set up in the cloud. Which of the following would most likely need to be configured so that the server has the appropriate access set up? (Choose two.)

Options:

A.

Application gateway

B.

IPS

C.

Port security

D.

Firewall

E.

Network security group

F.

Screened subnet

Question 19

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

Options:

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Question 20

A cloud architect needs to change the network configuration at a company that uses GitOps to document and implement network changes. The Git repository uses main as the default branch, and the main branch is protected. Which of the following should the architect do after cloning the repository?

Options:

A.

Use the main branch to make and commit the changes back to the remote repository.

B.

Create a new branch for the change, then create a pull request including the changes.

C.

Check out the development branch, then perform and commit the changes back to the remote repository.

D.

Rebase the remote main branch after making the changes to implement.

Question 21

Which of the following helps the security of the network design to align with industry best practices?

Options:

A.

Reference architectures

B.

Licensing agreement

C.

Service-level agreement

D.

Memorandum of understanding

Question 22

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

Options:

A.

Establish a plan of action to resolve the issue.

B.

Test the theory to determine cause.

C.

Document lessons learned.

D.

Implement the solution.

Question 23

A network administrator is troubleshooting an outage at a remote site. The administrator examines the logs and determines that one of the internet links at the site appears to be down. After the service provider confirms this information, the administrator fails over traffic to the backup link. Which of the following should the administrator do next?

Options:

A.

Document the lessons learned.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Verify full system functionality.

Question 24

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

as

Which of the following is the cause of the issue?

Options:

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Question 25

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

as

Which of the following is the most useful information to add to the dashboard for the operations team?

Options:

A.

404 errors

B.

Concurrent users

C.

Number of orders

D.

Number of active incidents

Page: 1 / 8
Total 84 questions