Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CNX-001 Sample Questions Answers

Questions 4

A network architect needs to design a new network to connect multiple private data centers. The network must:

    Provide privacy for all traffic between locations

    Use preexisting internet connections

    Use intelligent steering of application traffic over the best path

Which of the following best meets these requirements?

Options:

A.

MPLS connections

B.

SD-WAN

C.

Site-to-site VPN

D.

ExpressRoute

Buy Now
Questions 5

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

Options:

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

Buy Now
Questions 6

An administrator logged in to a cloud account on a shared machine but forgot to log out after the session ended. Which of the following types of security threats does this action pose?

Options:

A.

IP spoofing

B.

Zero-day

C.

On-path attack

D.

Privilege escalation

Buy Now
Questions 7

A cloud network engineer needs to enable network flow analysis in the VPC so headers and payload of captured data can be inspected. Which of the following should the engineer use for this task?

Options:

A.

Application monitoring

B.

Syslog service

C.

Traffic mirroring

D.

Network flows

Buy Now
Questions 8

An organization wants to evaluate network behavior with a network monitoring tool that is not inline. The organization will use the logs for further correlation and analysis of potential threats. Which of the following is the best solution?

Options:

A.

Syslog to a common dashboard used in the NOC

B.

SNMP trap with log analytics

C.

SSL decryption of network packets with preconfigured alerts

D.

NetFlow to feed into the SIEM

Buy Now
Questions 9

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

Options:

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Buy Now
Questions 10

A network administrator receives a ticket from one of the company's offices about video calls that work normally for one minute and then get very choppy. The network administrator pings the video server from that site to ensure that it is reachable:

(Ping output shows responses with varying latency times, including spikes: 11ms, 672ms, 849ms, 92ms, etc.)

Which of the following is most likely the cause of the video call issue?

Options:

A.

Throughput

B.

Jitter

C.

Latency

D.

Loss

Buy Now
Questions 11

A network load balancer is not correctly validating a client TLS certificate. The network architect needs to validate the certificate installed on the load balancer before progressing. Which of the following commands should the architect use to confirm whether the private key and certificate match?

Options:

A.

openssl-list -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

B.

openssl req -in certificate.csr -verify

openssl-verify -noout -modulus -in privkey.txt | openssl md5

C.

openssl-rsa -noout -modulus -in cert.crt | openssl md5

openssl-verify -noout -modulus -in privkey.txt | openssl md5

D.

openssl x509 -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

Buy Now
Questions 12

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

Options:

A.

Establish a plan of action to resolve the issue.

B.

Test the theory to determine cause.

C.

Document lessons learned.

D.

Implement the solution.

Buy Now
Questions 13

A company is transitioning from on-premises to a hybrid environment. Due to regulatory standards, the company needs to achieve a high level of reliability and high availability for the connection between its data center and the cloud provider. Which of the following solutions best meets the requirements?

Options:

A.

Establish a Direct Connect with the cloud provider and peer to two different VPCs in the cloud network.

B.

Establish a Direct Connect with the cloud provider and a redundant connection with a VPN over the internet.

C.

Establish two Direct Connect connections to the cloud provider using two different suppliers.

D.

Establish a VPN with two tunnels to a transit gateway at the cloud provider.

Buy Now
Questions 14

A security architect needs to increase the security controls around computer hardware installations. The requirements are:

    Auditable access logs to computer rooms

    Alerts for unauthorized access attempts

    Remote visibility to the inside of computer rooms

Which of the following controls best meet these requirements? (Choose two.)

Options:

A.

Video surveillance

B.

NFC access cards

C.

Motion sensors

D.

Locks and keys

E.

Security patrols

F.

Automated lighting

Buy Now
Questions 15

An administrator needs to add a device to the allow list in order to bypass user authentication of an AAA system. The administrator uses MAC filtering and needs to discover the device's MAC address to accomplish this task. The device receives an IP address from DHCP, but the IP address changes daily. Which of the following commands should the administrator run on the device to locate its MAC address?

Options:

A.

ipconfig /all

B.

netstat -an

C.

arp -a

D.

nslookup

Buy Now
Questions 16

A partner is migrating a client from on-premises to a hybrid cloud. Given the following project status information, the initial project timeline estimates need to be revised:

(Refer to image: Phases like Discovery, Design, Implementation, and Knowledge Transfer have all exceeded their initial estimated timelines.)

Which of the following documents needs to be revised to best reflect the current status of the project?

Options:

A.

BIA

B.

SLA

C.

SOW

D.

WBS

Buy Now
Questions 17

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

Which of the following is the most useful information to add to the dashboard for the operations team?

Options:

A.

404 errors

B.

Concurrent users

C.

Number of orders

D.

Number of active incidents

Buy Now
Questions 18

A company is experiencing Wi-Fi performance issues. Three Wi-Fi networks are available, each running on the 2.4 GHz band and on the same channel. Connecting to each Wi-Fi network yields slow performance. Which of the following channels should the networks be configured to?

Options:

A.

Channel 1, Channel 2, and Channel 3

B.

Channel 2, Channel 4, and Channel 9

C.

Channel 1, Channel 6, and Channel 11

D.

Channel 3, Channel 5, and Channel 10

Buy Now
Questions 19

A network administrator is configuring firewall rules to lock down the network from outside attacks. Which of the following should the administrator configure to create the most strict set of rules?

Options:

A.

URL filtering

B.

File blocking

C.

Network security group

D.

Allow List

Buy Now
Questions 20

A cloud architect needs to change the network configuration at a company that uses GitOps to document and implement network changes. The Git repository uses main as the default branch, and the main branch is protected. Which of the following should the architect do after cloning the repository?

Options:

A.

Use the main branch to make and commit the changes back to the remote repository.

B.

Create a new branch for the change, then create a pull request including the changes.

C.

Check out the development branch, then perform and commit the changes back to the remote repository.

D.

Rebase the remote main branch after making the changes to implement.

Buy Now
Questions 21

An administrator must ensure that credit card numbers are not contained in any outside messaging or file transfers from the organization. Which of the following controls meets this requirement?

Options:

A.

Intrusion detection system

B.

Egress filtering

C.

Data loss prevention

D.

Encryption in transit

Buy Now
Questions 22

After a malicious actor used an open port in a company's lobby, a network architect needs to enhance network security. The solution must enable:

    Security posture check

    Auto remediation capabilities

    Network isolation

    Device and user authentication

Which of the following technologies best meets these requirements?

Options:

A.

IPS

B.

Microsegmentation

C.

802.1X

D.

NAC

Buy Now
Questions 23

An architecture team needs to unify all logging and performance monitoring used by global applications across the enterprise to perform decision-making analytics. Which of the following technologies is the best way to fulfill this purpose?

Options:

A.

Relational database

B.

Content delivery network

C.

CIEM

D.

Data lake

Buy Now
Questions 24

A large commercial enterprise that runs a global video streaming platform recently acquired a small business that serves customers in a geographic area with limited connectivity to the global telecommunications infrastructure. The executive leadership team issued a mandate to deliver the highest possible video streaming quality to all customers around the world. Which of the following solutions should the enterprise architect suggest to meet the requirements?

Options:

A.

Serve the customers in the acquired area with a highly compressed version of content.

B.

Use a geographically weighted DNS solution to distribute the traffic.

C.

Deploy multiple local load balancers in the newly added geographic area.

D.

Utilize CDN for all customers regardless of geographic location.

Buy Now
Questions 25

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

Options:

A.

Secure web gateway

B.

Transit gateway

C.

Virtual private network

D.

Intrusion prevention system

E.

Network access control system

Buy Now
Exam Code: CNX-001
Exam Name: CompTIA CloudNetX Exam
Last Update: Aug 13, 2025
Questions: 84
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CNX-001