Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 25 questions
Exam Code: CNX-001                Update: Jun 14, 2025
Exam Name: CompTIA CloudNetX Exam

CompTIA CompTIA CloudNetX Exam CNX-001 Exam Dumps: Updated Questions & Answers (June 2025)

Question # 1

A company is migrating an application to the cloud for modernization. The engineer needs to provide dependencies between application and database tiers in the environment. Which of the following should the engineer reference in order to best meet this requirement?

A.

Internal knowledge base article

B.

CMDB

C.

WBS

D.

Diagram of physical server locations

E.

SOW

Question # 2

A network engineer adds a large group of servers to a screened subnet and configures them to use IPv6 only. The servers need to seamlessly communicate with IPv4 servers on the internal networks. Which of the following actions is the best way to achieve this goal?

A.

Add IPv6 to the network cards on the internal servers so they can communicate with the screened subnet.

B.

Set up a bridge between the screened subnet and internal networks to handle the conversion.

C.

Change the servers in the screened subnet from IPv6 addresses to IPv4 addresses.

D.

Implement NAT64 on the router between the screened subnet and the internal network.

Question # 3

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Question # 4

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Question # 5

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Question # 6

A cloud architect must recommend an architecture approach for a new medical application that requires the lowest downtime possible. Which of the following is the best application deployment strategy given the high-availability requirement?

A.

Two different availability zones (per region) using an active-active topology in two different regions

B.

Four different availability zones using an active-passive topology in a single region

C.

Four different availability zones using an active-active topology in a single region

D.

Two different availability zones (per region) using an active-passive topology in two different regions

Question # 7

A company hosts its applications on the cloud and is expanding its business to Europe. Thecompany must comply with General Data Protection Regulation (GDPR) to limit European customers' access to data. The network team configures the firewall rules but finds that some customers in the United States can access data hosted in Europe. Which of the following is the best option for the network team to configure?

A.

SASE

B.

Network security groups

C.

CDN

D.

Geofencing rule

Question # 8

A customer asks a MSP to propose a ZTA (Zero Trust Architecture) design for its globally distributed remote workforce. Given the following requirements:

    Authentication should be provided through the customer's SAML identity provider.

    Access should not be allowed from countries where the business does not operate.

    Secondary authentication should be added to the workflow to allow for passkeys.

    Changes to the user's device posture and hygiene should require reauthentication into the network.

    Access to the network should only be allowed to originate from corporate-owned devices.

Which of the following solutions should the MSP recommend to meet the requirements?

A.

Enforce certificate-based authentication.

Permit unauthenticated remote connectivity only from corporate IP addresses.

Enable geofencing.

Use cookie-based session tokens that do not expire for remembering user log-ins.

Increase RADIUS server timeouts.

B.

Enforce posture assessment only during the initial network log-on.

Implement RADIUS for SSO.

Restrict access from all non-U.S. IP addresses.

Configure a BYOD access policy.

Disable auditing for remote access.

C.

Chain the existing identity provider to a new SAML.

Require the use of time-based one-time passcode hardware tokens.

Enable debug logging on the VPN clients by default.

Disconnect users from the network only if their IP address changes.

D.

Configure geolocation settings to block certain IP addresses.

Enforce MFA.

Federate the solution via SSO.

Enable continuous access policies on the WireGuard tunnel.

Create a trusted endpoints policy.

Question # 9

An administrator logged in to a cloud account on a shared machine but forgot to log out after the session ended. Which of the following types of security threats does this action pose?

A.

IP spoofing

B.

Zero-day

C.

On-path attack

D.

Privilege escalation

Question # 10

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

Which of the following is the cause of the issue?

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Page: 1 / 3
Total 25 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 19 Jun 2025