Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

CNX-001 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CNX-001 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA CloudNetX Exam
  • Last Update: Oct 31, 2025
  • Questions and Answers: 84
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CNX-001 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CNX-001 Practice Exam Questions with Answers CompTIA CloudNetX Exam Certification

Question # 6

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

CNX-001 question answer

Which of the following is the cause of the issue?

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Full Access
Question # 7

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Full Access
Question # 8

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

A.

Secure web gateway

B.

Transit gateway

C.

Virtual private network

D.

Intrusion prevention system

E.

Network access control system

Full Access
Question # 9

A network architect must ensure only certain departments can access specific resources while on premises. Those same users cannot be allowed to access those resources once they have left campus. Which of the following would ensure access is provided according to these requirements?

A.

Enabling MFA for only those users within the departments needing access

B.

Configuring geofencing with the IPs of the resources

C.

Configuring UEBA to monitor all access to those resources during non-business hours

D.

Implementing a PKI-based authentication system to ensure access

Full Access
Question # 10

An organization's Chief Technical Officer is concerned that changes to the network using IaC are causing unscheduled outages. Which of the following best mitigates this risk?

A.

Making code changes to the master branch

B.

Enforcing code review of the change by the author

C.

Forking the code repository before making changes

D.

Adding review/approval steps to the CI/CD pipelines

Full Access
Question # 11

A company has a 40Gbps network that uses a network tap to inspect the traffic using an IDS. The IDS usually performs normally except when the servers are downloading patches from their local update repository 10.10.10.139 using HTTPS. During the patch windows, the IDS cannothandle the extra load and drops a significant number of packets. Which of the following would allow a network engineer to prevent this issue without compromising the network visibility?

A.

Configuring the IDS to ignore traffic from 10.10.10.139

B.

Using PF_RING offload to filter out "host 10.10.10.139 and port 443"

C.

Adding a "dst host 10.10.10.139" BPF on the tap

D.

Scheduling a cron job to stop the IDS service during the patch window

Full Access
Question # 12

Security policy states that all inbound traffic to the environment needs to be restricted, but all external outbound traffic is allowed within the hybrid cloud environment. A new application server was recently set up in the cloud. Which of the following would most likely need to be configured so that the server has the appropriate access set up? (Choose two.)

A.

Application gateway

B.

IPS

C.

Port security

D.

Firewall

E.

Network security group

F.

Screened subnet

Full Access
Question # 13

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Full Access
Question # 14

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

Full Access
Question # 15

A network architect needs to build a new data center for a large company that has business units that process retail financial transactions. Which of the following information should the architect request from the company?

A.

Regulatory requirements

B.

Statement of work

C.

Business case study

D.

Internal reference architecture

Full Access
Question # 16

A company is migrating an application to the cloud for modernization. The engineer needs to provide dependencies between application and database tiers in the environment. Which of the following should the engineer reference in order to best meet this requirement?

A.

Internal knowledge base article

B.

CMDB

C.

WBS

D.

Diagram of physical server locations

E.

SOW

Full Access
Question # 17

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Full Access
Question # 18

After a malicious actor used an open port in a company's lobby, a network architect needs to enhance network security. The solution must enable:

    Security posture check

    Auto remediation capabilities

    Network isolation

    Device and user authentication

Which of the following technologies best meets these requirements?

A.

IPS

B.

Microsegmentation

C.

802.1X

D.

NAC

Full Access
Question # 19

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

CNX-001 question answer

A router on the same network shows the following output:

CNX-001 question answer

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Full Access
Question # 20

A SaaS company's new service currently is being provided through four servers. The company's end users are having connection issues, which is affecting about 25% of the connections. Which of the following is most likely the root cause of this issue?

A.

The service is using round-robin load balancing through a DNS server with one server down.

B.

The service is using weighted load balancing with 40% of the traffic on server A, 20% on server B, 20% on server C, and server D is down.

C.

The service is using a least-connection load-balancing method with one server down.

D.

Load balancing is configured with a health check in front of these servers, and one of these servers is unavailable.

Full Access
Question # 21

A company is expanding operations and opening a new facility. The executive leadership team decides to purchase an insurance policy that will cover the cost of rebuilding the facility in case of a natural disaster. Which of the following describes the team's decision?

A.

Business continuity

B.

Disaster recovery

C.

Risk transference

D.

Memorandum of understanding

Full Access
Question # 22

A customer asks a MSP to propose a ZTA (Zero Trust Architecture) design for its globally distributed remote workforce. Given the following requirements:

    Authentication should be provided through the customer's SAML identity provider.

    Access should not be allowed from countries where the business does not operate.

    Secondary authentication should be added to the workflow to allow for passkeys.

    Changes to the user's device posture and hygiene should require reauthentication into the network.

    Access to the network should only be allowed to originate from corporate-owned devices.

Which of the following solutions should the MSP recommend to meet the requirements?

A.

Enforce certificate-based authentication.

Permit unauthenticated remote connectivity only from corporate IP addresses.

Enable geofencing.

Use cookie-based session tokens that do not expire for remembering user log-ins.

Increase RADIUS server timeouts.

B.

Enforce posture assessment only during the initial network log-on.

Implement RADIUS for SSO.

Restrict access from all non-U.S. IP addresses.

Configure a BYOD access policy.

Disable auditing for remote access.

C.

Chain the existing identity provider to a new SAML.

Require the use of time-based one-time passcode hardware tokens.

Enable debug logging on the VPN clients by default.

Disconnect users from the network only if their IP address changes.

D.

Configure geolocation settings to block certain IP addresses.

Enforce MFA.

Federate the solution via SSO.

Enable continuous access policies on the WireGuard tunnel.

Create a trusted endpoints policy.

Full Access
Question # 23

A network engineer is designing a Layer 2 deployment for a company that occupies severalfloors in an office building. The engineer decides to make each floor its own VLAN but still allow for communication between all user VLANs. The engineer also wants to reduce the time necessary for STP convergence to occur when new switches come online. Which of the following should the engineer enable to accomplish this goal?

A.

BPDU Guard

B.

Priority

C.

Tagging

D.

Portfast

Full Access
Question # 24

A global company has depots in various locations. A proprietary application was deployed locally at each of the depots, but issues with getting the consolidated data instantly occurred. The Chief Information Officer decided to centralize the application and deploy it in the cloud. After the cloud deployment, users report the application is slow. Which of the following is most likely the issue?

A.

Throttling

B.

Overutilization

C.

Packet loss

D.

Latency

Full Access
Question # 25

Throughout the day, a sales team experiences videoconference performance issues when the accounting department runs reports. Which of the following is the best solution?

A.

Running the accounting department's reports outside of business hours

B.

Using a load balancer to split the video traffic evenly

C.

Configuring QoS on the corporate network switches

D.

Increasing the throughput on the network by purchasing high-end switches

Full Access