New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CloudNetX CNX-001 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

A network engineer identified several failed log-in attempts to the VPN from a user's account. When the engineer inquired, the user mentioned the IT help desk called and asked them to change their password. Which of the following types of attacks occurred?

Options:

A.

Initialization vector


B.

On-path


C.

Evil twin


D.

Social engineering


Expert Solution
Questions # 12:

A network architect is working on a physical network design template for a small education institution's satellite campus that is not yet built. The new campus location will consist of two small buildings with classrooms, one screening room with audiovisual equipment, and 200 seats for students. Which of the following enterprise network designs should the architect suggest?

Options:

A.

Hybrid


B.

Dual-layer


C.

Three-tier


D.

Collapsed core


Expert Solution
Questions # 13:

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

Options:

A.

Secure web gateway


B.

Transit gateway


C.

Virtual private network


D.

Intrusion prevention system


E.

Network access control system


Expert Solution
Questions # 14:

A global company has depots in various locations. A proprietary application was deployed locally at each of the depots, but issues with getting the consolidated data instantly occurred. The Chief Information Officer decided to centralize the application and deploy it in the cloud. After the cloud deployment, users report the application is slow. Which of the following is most likely the issue?

Options:

A.

Throttling


B.

Overutilization


C.

Packet loss


D.

Latency


Expert Solution
Questions # 15:

Which of the following helps the security of the network design to align with industry best practices?

Options:

A.

Reference architectures


B.

Licensing agreement


C.

Service-level agreement


D.

Memorandum of understanding


Expert Solution
Questions # 16:

A network security engineer must secure a web application running on virtual machines in a public cloud. The virtual machines are behind an application load balancer. Which of the following technologies should the engineer use to secure the virtual machines? (Choose two.)

Options:

A.

CDN


B.

DLP


C.

IDS


D.

WAF


E.

SIEM


F.

NSG


Expert Solution
Questions # 17:

An outage occurred after a software upgrade on core switching. A network administrator thinks that the firmware installed had a bug. Which of the following should the network administrator do next?

Options:

A.

Establish a plan of action to resolve the issue.


B.

Test the theory to determine cause.


C.

Document lessons learned.


D.

Implement the solution.


Expert Solution
Questions # 18:

A network architect is designing a solution to place network core equipment in a rack inside a data center. This equipment is crucial to the enterprise and must be as secure as possible to minimize the chance that anyone could connect directly to the network core. The current security setup is:

    In a locked building that requires sign in with a guard and identification check.

    In a locked data center accessible by a proximity badge and fingerprint scanner.

    In a locked cabinet that requires the security guard to call the Chief Information Security Officer (CISO) to get permission to provide the key.

Which of the following additional measures should the architect recommend to make this equipment more secure?

Options:

A.

Make all engineers with access to the data center sign a statement of work.


B.

Set up a video surveillance system that has cameras focused on the cabinet.


C.

Have the CISO accompany any network engineer that needs to do work in this cabinet.


D.

Require anyone entering the data center for any reason to undergo a background check.


Expert Solution
Questions # 19:

New devices were deployed on a network and need to be hardened.

INSTRUCTIONS

Use the drop-down menus to define the appliance-hardening techniques that provide themostsecure solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 19


Expert Solution
Questions # 20:

A SaaS company's new service currently is being provided through four servers. The company's end users are having connection issues, which is affecting about 25% of the connections. Which of the following is most likely the root cause of this issue?

Options:

A.

The service is using round-robin load balancing through a DNS server with one server down.


B.

The service is using weighted load balancing with 40% of the traffic on server A, 20% on server B, 20% on server C, and server D is down.


C.

The service is using a least-connection load-balancing method with one server down.


D.

Load balancing is configured with a health check in front of these servers, and one of these servers is unavailable.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions