Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CloudNetX CNX-001 Questions and answers with ValidTests

Exam CNX-001 All Questions
Exam CNX-001 Premium Access

View all detail and faqs for the CNX-001 exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Application development team users are having issues accessing the database server within the cloud environment. All other users are able to use SSH to access this server without issues. The network architect reviews the following information to troubleshoot the issue:

Question # 1

Traceroute output from an application developer's machine with the assigned IP 192.168.2.7:

Question # 1

    Application development gateway: 192.168.2.1/24

    Server segment gateway: 192.168.1.1/24

    Database server: 192.168.1.9

    Application developer machine IP: 192.168.2.7

    Traceroute ends at hop 4: 192.168.4.1 (server segment firewall), then times out

Which of the following is the most likely cause of the issue?

Options:

A.

The core firewall is blocking the traffic.

B.

Network security groups do not have the correct outbound rule configured.

C.

The server segment firewall is dropping the traffic.

D.

The server segment gateway is having bandwidth issues.

Expert Solution
Questions # 2:

A network administrator must connect a remote building at a manufacturing plant to the main building via a wireless connection. Which of the following should the administrator choose to get the greatest possible range from the wireless connection? (Choose two.)

Options:

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

Omnidirectional antenna

E.

Patch antenna

F.

Built-in antenna

Expert Solution
Questions # 3:

A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0/8. Which of the following is the best solution?

Options:

A.

Allocate 10.1.0.0/30 to the IT department. Allocate 10.2.0.0/16 to the sales department.

B.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/24 to the sales department.

C.

Allocate 10.1.0.0/22 to the IT department. Allocate 10.2.0.0/15 to the sales department.

D.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/25 to the sales department.

Expert Solution
Questions # 4:

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

Options:

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Expert Solution
Questions # 5:

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

Question # 5

Which of the following is the most useful information to add to the dashboard for the operations team?

Options:

A.

404 errors

B.

Concurrent users

C.

Number of orders

D.

Number of active incidents

Expert Solution
Questions # 6:

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

Options:

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Expert Solution
Questions # 7:

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

Question # 7

Which of the following is the cause of the issue?

Options:

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Expert Solution
Questions # 8:

An organization's Chief Technical Officer is concerned that changes to the network using IaC are causing unscheduled outages. Which of the following best mitigates this risk?

Options:

A.

Making code changes to the master branch

B.

Enforcing code review of the change by the author

C.

Forking the code repository before making changes

D.

Adding review/approval steps to the CI/CD pipelines

Expert Solution
Questions # 9:

A network security engineer must secure a web application running on virtual machines in a public cloud. The virtual machines are behind an application load balancer. Which of the following technologies should the engineer use to secure the virtual machines? (Choose two.)

Options:

A.

CDN

B.

DLP

C.

IDS

D.

WAF

E.

SIEM

F.

NSG

Expert Solution
Questions # 10:

After a malicious actor used an open port in a company's lobby, a network architect needs to enhance network security. The solution must enable:

    Security posture check

    Auto remediation capabilities

    Network isolation

    Device and user authentication

Which of the following technologies best meets these requirements?

Options:

A.

IPS

B.

Microsegmentation

C.

802.1X

D.

NAC

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions