Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA CNX-001 CompTIA CloudNetX Exam Exam Practice Test

Demo: 25 questions
Total 84 questions

CompTIA CloudNetX Exam Questions and Answers

Question 1

A company is experiencing Wi-Fi performance issues. Three Wi-Fi networks are available, each running on the 2.4 GHz band and on the same channel. Connecting to each Wi-Fi network yields slow performance. Which of the following channels should the networks be configured to?

Options:

A.

Channel 1, Channel 2, and Channel 3

B.

Channel 2, Channel 4, and Channel 9

C.

Channel 1, Channel 6, and Channel 11

D.

Channel 3, Channel 5, and Channel 10

Question 2

A SaaS company is launching a new product based in a cloud environment. The new product will be provided as an API and should not be exposed to the internet. Which of the following should the company create to best meet this requirement?

Options:

A.

A transit gateway that connects the API to the customer's VPC

B.

Firewall rules allowing access to the API endpoint from the customer's VPC

C.

A VPC peering connection from the API VPC to the customer's VPC

D.

A private service endpoint exposing the API endpoint to the customer's VPC

Question 3

After a malicious actor used an open port in a company's lobby, a network architect needs to enhance network security. The solution must enable:

    Security posture check

    Auto remediation capabilities

    Network isolation

    Device and user authentication

Which of the following technologies best meets these requirements?

Options:

A.

IPS

B.

Microsegmentation

C.

802.1X

D.

NAC

Question 4

A global company has depots in various locations. A proprietary application was deployed locally at each of the depots, but issues with getting the consolidated data instantly occurred. The Chief Information Officer decided to centralize the application and deploy it in the cloud. After the cloud deployment, users report the application is slow. Which of the following is most likely the issue?

Options:

A.

Throttling

B.

Overutilization

C.

Packet loss

D.

Latency

Question 5

A call center company provides its services through a VoIP infrastructure. Recently, the call center set up an application to manage its documents on a cloud application. The application is causing recurring audio losses for VoIP callers. The network administrator needs to fix the issue with the least expensive solution. Which of the following is the best approach?

Options:

A.

Adding a second internet link and physically splitting voice and data networks into different routes

B.

Configuring QoS rules at the internet router to prioritize the VoIP calls

C.

Creating two VLANs, one for voice and the other for data

D.

Setting up VoIP devices to use a voice codec with a higher compression rate

Question 6

A company is expanding its network and needs to ensure improved stability and reliability. The proposed solution must fulfill the following requirements:

    Detection and prevention of network loops

    Automatic configuration of ports

    Standard protocol (not proprietary)

Which of the following protocols is the most appropriate?

Options:

A.

STP

B.

SIP

C.

RTSP

D.

BGP

Question 7

A company hosts its applications on the cloud and is expanding its business to Europe. Thecompany must comply with General Data Protection Regulation (GDPR) to limit European customers' access to data. The network team configures the firewall rules but finds that some customers in the United States can access data hosted in Europe. Which of the following is the best option for the network team to configure?

Options:

A.

SASE

B.

Network security groups

C.

CDN

D.

Geofencing rule

Question 8

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

Options:

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

Question 9

Which of the following helps the security of the network design to align with industry best practices?

Options:

A.

Reference architectures

B.

Licensing agreement

C.

Service-level agreement

D.

Memorandum of understanding

Question 10

A network engineer is designing a Layer 2 deployment for a company that occupies severalfloors in an office building. The engineer decides to make each floor its own VLAN but still allow for communication between all user VLANs. The engineer also wants to reduce the time necessary for STP convergence to occur when new switches come online. Which of the following should the engineer enable to accomplish this goal?

Options:

A.

BPDU Guard

B.

Priority

C.

Tagging

D.

Portfast

Question 11

A network architect must design a new branch network that meets the following requirements:

    No single point of failure

    Clients cannot be impacted by changes to the underlying medium

    Clients must be able to communicate directly to preserve bandwidth

Which of the following network topologies should the architect use?

Options:

A.

Hub-and-spoke

B.

Mesh

C.

Spine-and-leaf

D.

Star

Question 12

After a company migrated all services to the cloud, the security auditor discovers many users have administrator roles on different services. The company needs a solution that:

    Protects the services on the cloud

    Limits access to administrative roles

    Creates a policy to approve requests for administrative roles on critical services within a limited time

    Forces password rotation for administrative roles

    Audits usage of administrative roles

Which of the following is the best way to meet the company's requirements?

Options:

A.

Privileged access management

B.

Session-based token

C.

Conditional access

D.

Access control list

Question 13

A cloud architect must recommend an architecture approach for a new medical application that requires the lowest downtime possible. Which of the following is the best application deployment strategy given the high-availability requirement?

Options:

A.

Two different availability zones (per region) using an active-active topology in two different regions

B.

Four different availability zones using an active-passive topology in a single region

C.

Four different availability zones using an active-active topology in a single region

D.

Two different availability zones (per region) using an active-passive topology in two different regions

Question 14

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

Which of the following is the cause of the issue?

Options:

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Question 15

An administrator must ensure that credit card numbers are not contained in any outside messaging or file transfers from the organization. Which of the following controls meets this requirement?

Options:

A.

Intrusion detection system

B.

Egress filtering

C.

Data loss prevention

D.

Encryption in transit

Question 16

A network security administrator needs to set up a solution to:

    Gather all data from log files in a single location.

    Correlate the data to generate alerts.

Which of the following should the administrator implement?

Options:

A.

Syslog

B.

Event log monitoring

C.

Log management

D.

SIEM

Question 17

A cloud engineer is planning to build VMs in a public cloud environment for a cloud migration. A cloud security policy restricts access to the console for new VM builds. The engineer wants to replicate the settings for each of the VMs to ensure the network settings are preconfigured. Which of the following is the best deployment method?

Options:

A.

IaC template

B.

Custom SDK

C.

API script

D.

CLI command

Question 18

New devices were deployed on a network and need to be hardened.

INSTRUCTIONS

Use the drop-down menus to define the appliance-hardening techniques that provide themostsecure solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 19

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

Options:

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

Question 20

A network architect is working on a physical network design template for a small education institution's satellite campus that is not yet built. The new campus location will consist of two small buildings with classrooms, one screening room with audiovisual equipment, and 200 seats for students. Which of the following enterprise network designs should the architect suggest?

Options:

A.

Hybrid

B.

Dual-layer

C.

Three-tier

D.

Collapsed core

Question 21

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

Options:

A.

Establish a plan of action to resolve the issue.

B.

Test the theory to determine cause.

C.

Document lessons learned.

D.

Implement the solution.

Question 22

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

Options:

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Question 23

A network engineer is working on securing the environment in the screened subnet. Before penetration testing, the engineer would like to run a scan on the servers to identify the OS, application versions, and open ports. Which of the following commands should the engineer use to obtain the information?

Options:

A.

tcpdump -ni eth0 src net 10.10.10.0/28

B.

nmap -A 10.10.10.0/28

C.

nc -v -n 10.10.10.x 1-1000

D.

hping3 -1 10.10.10.x -rand-dest -I eth0

Question 24

An organization has centralized logging capability at the on-premises data center and wants a solution that can consolidate logging from deployed cloud workloads. The organization would like to automate the detection and alerting mechanism. Which of the following best meets the requirements?

Options:

A.

IDS/IPS

B.

SIEM

C.

Data lake

D.

Syslog

Question 25

A network architect needs to design a solution to ensure every cloud environment network is built to the same baseline. The solution must meet the following requirements:

    Use automated deployment.

    Easily update multiple environments.

    Share code with a community of practice.

Which of the following are the best solutions? (Choose two.)

Options:

A.

CI/CD pipelines

B.

Public code repository

C.

Deployment runbooks

D.

Private code repository

E.

Automated image deployment

F.

Deployment guides

Demo: 25 questions
Total 84 questions