Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CNX-001 CompTIA CloudNetX Exam Questions and Answers

Questions 4

A SaaS company is launching a new product based in a cloud environment. The new product will be provided as an API and should not be exposed to the internet. Which of the following should the company create to best meet this requirement?

Options:

A.

A transit gateway that connects the API to the customer's VPC

B.

Firewall rules allowing access to the API endpoint from the customer's VPC

C.

A VPC peering connection from the API VPC to the customer's VPC

D.

A private service endpoint exposing the API endpoint to the customer's VPC

Buy Now
Questions 5

An administrator needs to add a device to the allow list in order to bypass user authentication of an AAA system. The administrator uses MAC filtering and needs to discover the device's MAC address to accomplish this task. The device receives an IP address from DHCP, but the IP address changes daily. Which of the following commands should the administrator run on the device to locate its MAC address?

Options:

A.

ipconfig /all

B.

netstat -an

C.

arp -a

D.

nslookup

Buy Now
Questions 6

A partner is migrating a client from on-premises to a hybrid cloud. Given the following project status information, the initial project timeline estimates need to be revised:

CNX-001 Question 6

(Refer to image: Phases like Discovery, Design, Implementation, and Knowledge Transfer have all exceeded their initial estimated timelines.)

Which of the following documents needs to be revised to best reflect the current status of the project?

Options:

A.

BIA

B.

SLA

C.

SOW

D.

WBS

Buy Now
Questions 7

A network architect is creating a network topology for a global SD-WAN deployment. The business has offices in Asia, Europe, and the United States and makes use of data centers in theUnited States and Europe. Most traffic between sites must have the lowest latency possible. Which of the following topologies best meets this requirement?

Options:

A.

Star

B.

Spine-and-leaf

C.

Mesh

D.

Hub-and-spoke

Buy Now
Questions 8

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

Options:

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Buy Now
Questions 9

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

Options:

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

Buy Now
Questions 10

A network architect must design a new branch network that meets the following requirements:

    No single point of failure

    Clients cannot be impacted by changes to the underlying medium

    Clients must be able to communicate directly to preserve bandwidth

Which of the following network topologies should the architect use?

Options:

A.

Hub-and-spoke

B.

Mesh

C.

Spine-and-leaf

D.

Star

Buy Now
Questions 11

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

Options:

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

Buy Now
Questions 12

A cloud architect must recommend an architecture approach for a new medical application that requires the lowest downtime possible. Which of the following is the best application deployment strategy given the high-availability requirement?

Options:

A.

Two different availability zones (per region) using an active-active topology in two different regions

B.

Four different availability zones using an active-passive topology in a single region

C.

Four different availability zones using an active-active topology in a single region

D.

Two different availability zones (per region) using an active-passive topology in two different regions

Buy Now
Questions 13

A company provides an API that runs on the public cloud for its customers. A fixed number of VMs host the APIs. During peak hours, the company notices a spike in usage that results in network communication speeds slowing down for all customers. The management team has decided that access for all customers should be fair and accessible at all times. Which of the following is the most cost-effective way to address this issue?

Options:

A.

Use an allow list for customers using APIs.

B.

Increase the number of VMs running APIs.

C.

Enable throttling on APIs.

D.

Increase the MTU on the VMs.

Buy Now
Questions 14

A network engineer identified several failed log-in attempts to the VPN from a user's account. When the engineer inquired, the user mentioned the IT help desk called and asked them to change their password. Which of the following types of attacks occurred?

Options:

A.

Initialization vector

B.

On-path

C.

Evil twin

D.

Social engineering

Buy Now
Questions 15

A network architect is designing a solution to secure the organization's applications based on the security policy. The requirements are:

    Users must authenticate using one set of credentials.

    External users must be located in authorized sites.

    Session timeouts must be enforced.

    Network access requirements should be changed as needed.

Which of the following best meet these requirements? (Choose two.)

Options:

A.

Role-based access

B.

Single sign-on

C.

Static IP allocation

D.

Multifactor authentication

E.

Conditional access policy

F.

Risk-based authentication

Buy Now
Questions 16

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

Options:

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Buy Now
Questions 17

A company is expanding its network and needs to ensure improved stability and reliability. The proposed solution must fulfill the following requirements:

    Detection and prevention of network loops

    Automatic configuration of ports

    Standard protocol (not proprietary)

Which of the following protocols is the most appropriate?

Options:

A.

STP

B.

SIP

C.

RTSP

D.

BGP

Buy Now
Questions 18

An organization's Chief Technical Officer is concerned that changes to the network using IaC are causing unscheduled outages. Which of the following best mitigates this risk?

Options:

A.

Making code changes to the master branch

B.

Enforcing code review of the change by the author

C.

Forking the code repository before making changes

D.

Adding review/approval steps to the CI/CD pipelines

Buy Now
Questions 19

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

CNX-001 Question 19

A router on the same network shows the following output:

CNX-001 Question 19

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

Options:

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Buy Now
Questions 20

A customer asks a MSP to propose a ZTA (Zero Trust Architecture) design for its globally distributed remote workforce. Given the following requirements:

    Authentication should be provided through the customer's SAML identity provider.

    Access should not be allowed from countries where the business does not operate.

    Secondary authentication should be added to the workflow to allow for passkeys.

    Changes to the user's device posture and hygiene should require reauthentication into the network.

    Access to the network should only be allowed to originate from corporate-owned devices.

Which of the following solutions should the MSP recommend to meet the requirements?

Options:

A.

Enforce certificate-based authentication.

Permit unauthenticated remote connectivity only from corporate IP addresses.

Enable geofencing.

Use cookie-based session tokens that do not expire for remembering user log-ins.

Increase RADIUS server timeouts.

B.

Enforce posture assessment only during the initial network log-on.

Implement RADIUS for SSO.

Restrict access from all non-U.S. IP addresses.

Configure a BYOD access policy.

Disable auditing for remote access.

C.

Chain the existing identity provider to a new SAML.

Require the use of time-based one-time passcode hardware tokens.

Enable debug logging on the VPN clients by default.

Disconnect users from the network only if their IP address changes.

D.

Configure geolocation settings to block certain IP addresses.

Enforce MFA.

Federate the solution via SSO.

Enable continuous access policies on the WireGuard tunnel.

Create a trusted endpoints policy.

Buy Now
Questions 21

A network administrator receives a ticket from one of the company's offices about video calls that work normally for one minute and then get very choppy. The network administrator pings the video server from that site to ensure that it is reachable:

(Ping output shows responses with varying latency times, including spikes: 11ms, 672ms, 849ms, 92ms, etc.)

CNX-001 Question 21

Which of the following is most likely the cause of the video call issue?

Options:

A.

Throughput

B.

Jitter

C.

Latency

D.

Loss

Buy Now
Questions 22

As part of a project to modernize a sports stadium and improve the customer service experience for fans, the stadium owners want to implement a new wireless system. Currently, all tickets are electronic and managed by the stadium mobile application. The new solution is required to allow location tracking precision within 5ft (1.5m) of fans to deliver the following services:

    Emergency/security assistance

    Mobile food order

    Event special effects

    Raffle winner location displayed on the giant stadium screen

Which of the following technologies enables location tracking?

Options:

A.

SSID

B.

BLE

C.

NFC

D.

IoT

Buy Now
Questions 23

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

Options:

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Buy Now
Questions 24

A network engineer is installing new switches in the data center to replace existing infrastructure. The previous network hardware had administrative interfaces that were plugged into the existing network along with all other server hardware on the same subnet. Which of the following should the engineer do to better secure these administrative interfaces?

Options:

A.

Connect the switch management ports to a separate physical network.

B.

Disable unused physical ports on the switches to keep unauthorized users out.

C.

Set the administrative interfaces and the network switch ports on the same VLAN.

D.

Upgrade all of the switch firmware to the latest hardware levels.

Buy Now
Questions 25

A company is experiencing numerous network issues and decides to expand its support team. The new junior employees will need to be onboarded in the shortest time possible and be able to troubleshoot issues with minimal assistance. Which of the following should the company create to achieve this goal?

Options:

A.

Statement of work documenting what each junior employee should do when troubleshooting

B.

Clearly documented runbooks for networking issues and knowledge base articles

C.

Physical and logical network diagrams of the entire networking infrastructure

D.

A mentor program for guiding each junior employee until they are familiar with the networking infrastructure

Buy Now
Exam Code: CNX-001
Exam Name: CompTIA CloudNetX Exam
Last Update: Jun 11, 2025
Questions: 84

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CNX-001 testing engine

PDF (Q&A)

$36.75  $104.99
buy now CNX-001 pdf