Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CNX-001 CompTIA CloudNetX Exam Questions and Answers

Questions 4

A network administrator needs to resolve connectivity issues in a hybrid cloud setup. Workstations and VMs are not able to access Application A. Workstations are able to access Server B.

INSTRUCTIONS

Click on workstations, VMs, firewalls, and NSGs to troubleshoot and gather information. Type help in the terminal to view a list of available commands.

Select the appropriate device(s) requiring remediation and identify the associated issue(s).

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

CNX-001 Question 4

Options:

Buy Now
Questions 5

A company hosts a cloud-based e-commerce application and only wants the application accessed from certain locations. The network team configures a cloud firewall with WAF enabled, but users can access the application globally. Which of the following should the network team do?

Options:

A.

Reconfigure WAF rules

B.

Configure a NAT gateway

C.

Implement a CDN

D.

Configure geo-restriction

Buy Now
Questions 6

A network engineer identified several failed log-in attempts to the VPN from a user's account. When the engineer inquired, the user mentioned the IT help desk called and asked them to change their password. Which of the following types of attacks occurred?

Options:

A.

Initialization vector

B.

On-path

C.

Evil twin

D.

Social engineering

Buy Now
Questions 7

An organization with an on-premises data center is adopting additional cloud-based solutions. The organization wants to keep communication secure between remote employees' devices and workloads. Which of the following ZTA features best achieves this goal?

Options:

A.

Secure service edge

B.

Cloud access security broker

C.

Principle of least privilege

D.

Identity as the perimeter

Buy Now
Questions 8

A company has a 40Gbps network that uses a network tap to inspect the traffic using an IDS. The IDS usually performs normally except when the servers are downloading patches from their local update repository 10.10.10.139 using HTTPS. During the patch windows, the IDS cannothandle the extra load and drops a significant number of packets. Which of the following would allow a network engineer to prevent this issue without compromising the network visibility?

Options:

A.

Configuring the IDS to ignore traffic from 10.10.10.139

B.

Using PF_RING offload to filter out "host 10.10.10.139 and port 443"

C.

Adding a "dst host 10.10.10.139" BPF on the tap

D.

Scheduling a cron job to stop the IDS service during the patch window

Buy Now
Questions 9

A network engineer is installing new switches in the data center to replace existing infrastructure. The previous network hardware had administrative interfaces that were plugged into the existing network along with all other server hardware on the same subnet. Which of the following should the engineer do to better secure these administrative interfaces?

Options:

A.

Connect the switch management ports to a separate physical network.

B.

Disable unused physical ports on the switches to keep unauthorized users out.

C.

Set the administrative interfaces and the network switch ports on the same VLAN.

D.

Upgrade all of the switch firmware to the latest hardware levels.

Buy Now
Questions 10

A network architect needs to design a new network to connect multiple private data centers. The network must:

    Provide privacy for all traffic between locations

    Use preexisting internet connections

    Use intelligent steering of application traffic over the best path

Which of the following best meets these requirements?

Options:

A.

MPLS connections

B.

SD-WAN

C.

Site-to-site VPN

D.

ExpressRoute

Buy Now
Questions 11

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

Options:

A.

Secure web gateway

B.

Transit gateway

C.

Virtual private network

D.

Intrusion prevention system

E.

Network access control system

Buy Now
Questions 12

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

CNX-001 Question 12

A router on the same network shows the following output:

CNX-001 Question 12

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

Options:

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Buy Now
Questions 13

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

Options:

A.

Establish a plan of action to resolve the issue.

B.

Test the theory to determine cause.

C.

Document lessons learned.

D.

Implement the solution.

Buy Now
Questions 14

A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0/8. Which of the following is the best solution?

Options:

A.

Allocate 10.1.0.0/30 to the IT department. Allocate 10.2.0.0/16 to the sales department.

B.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/24 to the sales department.

C.

Allocate 10.1.0.0/22 to the IT department. Allocate 10.2.0.0/15 to the sales department.

D.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/25 to the sales department.

Buy Now
Questions 15

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

CNX-001 Question 15

Which of the following is the cause of the issue?

Options:

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Buy Now
Questions 16

You are designing a campus network with a three-tier hierarchy and need to ensure secure connectivity between locations and traveling employees.

INSTRUCTIONS

Review the command output by clicking on the server, laptops, and workstations on the network.

Use the drop-down menus to determine the appropriate technology and label for each layer on the diagram. Options may only be used once.

Click on the magnifying glass to make additional configuration changes.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CNX-001 Question 16

Options:

Buy Now
Questions 17

Security policy states that all inbound traffic to the environment needs to be restricted, but all external outbound traffic is allowed within the hybrid cloud environment. A new application server was recently set up in the cloud. Which of the following would most likely need to be configured so that the server has the appropriate access set up? (Choose two.)

Options:

A.

Application gateway

B.

IPS

C.

Port security

D.

Firewall

E.

Network security group

F.

Screened subnet

Buy Now
Questions 18

A network security administrator needs to set up a solution to:

    Gather all data from log files in a single location.

    Correlate the data to generate alerts.

Which of the following should the administrator implement?

Options:

A.

Syslog

B.

Event log monitoring

C.

Log management

D.

SIEM

Buy Now
Questions 19

An architecture team needs to unify all logging and performance monitoring used by global applications across the enterprise to perform decision-making analytics. Which of the following technologies is the best way to fulfill this purpose?

Options:

A.

Relational database

B.

Content delivery network

C.

CIEM

D.

Data lake

Buy Now
Questions 20

An administrator must ensure that credit card numbers are not contained in any outside messaging or file transfers from the organization. Which of the following controls meets this requirement?

Options:

A.

Intrusion detection system

B.

Egress filtering

C.

Data loss prevention

D.

Encryption in transit

Buy Now
Questions 21

A network architect is designing a solution to place network core equipment in a rack inside a data center. This equipment is crucial to the enterprise and must be as secure as possible to minimize the chance that anyone could connect directly to the network core. The current security setup is:

    In a locked building that requires sign in with a guard and identification check.

    In a locked data center accessible by a proximity badge and fingerprint scanner.

    In a locked cabinet that requires the security guard to call the Chief Information Security Officer (CISO) to get permission to provide the key.

Which of the following additional measures should the architect recommend to make this equipment more secure?

Options:

A.

Make all engineers with access to the data center sign a statement of work.

B.

Set up a video surveillance system that has cameras focused on the cabinet.

C.

Have the CISO accompany any network engineer that needs to do work in this cabinet.

D.

Require anyone entering the data center for any reason to undergo a background check.

Buy Now
Questions 22

An organization has centralized logging capability at the on-premises data center and wants a solution that can consolidate logging from deployed cloud workloads. The organization would like to automate the detection and alerting mechanism. Which of the following best meets the requirements?

Options:

A.

IDS/IPS

B.

SIEM

C.

Data lake

D.

Syslog

Buy Now
Questions 23

A network administrator is configuring firewall rules to lock down the network from outside attacks. Which of the following should the administrator configure to create the most strict set of rules?

Options:

A.

URL filtering

B.

File blocking

C.

Network security group

D.

Allow List

Buy Now
Questions 24

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

Options:

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Buy Now
Questions 25

A company hosts its applications on the cloud and is expanding its business to Europe. Thecompany must comply with General Data Protection Regulation (GDPR) to limit European customers' access to data. The network team configures the firewall rules but finds that some customers in the United States can access data hosted in Europe. Which of the following is the best option for the network team to configure?

Options:

A.

SASE

B.

Network security groups

C.

CDN

D.

Geofencing rule

Buy Now
Exam Code: CNX-001
Exam Name: CompTIA CloudNetX Exam
Last Update: Oct 14, 2025
Questions: 84

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90