Pass the CompTIA CloudNetX CNX-001 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

End users are getting certificate errors and are unable to connect to an application deployed in a cloud. The application requires HTTPS connection. A network solution architect finds that a firewall is deployed between end users and the application in the cloud. Which of the following is the root cause of the issue?

Options:

A.

The firewall on the application server has port 443 blocked.


B.

The firewall has port 443 blocked while SSL/HTTPS inspection is enabled.


C.

The end users do not have certificates on their laptops.


D.

The firewall has an expired certificate while SSL/HTTPS inspection is enabled.


Questions # 12:

A company is experiencing multiple switch failures. The network analyst discovers the following:

    Network recovery time is unacceptable and occurs after the shutdown of some switches.

    Some loops were detected in the network.

    No broadcast storm was detected.

Which of the following is the most cost-effective solution?

Options:

A.

Add a new Layer 3 switch.


B.

Add multiple VLANs.


C.

Implement STP.


D.

Implement tagging.


Questions # 13:

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

Question # 13

Which of the following is the most useful information to add to the dashboard for the operations team?

Options:

A.

404 errors


B.

Concurrent users


C.

Number of orders


D.

Number of active incidents


Questions # 14:

A network security administrator needs to set up a solution to:

    Gather all data from log files in a single location.

    Correlate the data to generate alerts.

Which of the following should the administrator implement?

Options:

A.

Syslog


B.

Event log monitoring


C.

Log management


D.

SIEM


Questions # 15:

An organization wants to evaluate network behavior with a network monitoring tool that is not inline. The organization will use the logs for further correlation and analysis of potential threats. Which of the following is the best solution?

Options:

A.

Syslog to a common dashboard used in the NOC


B.

SNMP trap with log analytics


C.

SSL decryption of network packets with preconfigured alerts


D.

NetFlow to feed into the SIEM


Questions # 16:

A network engineer is installing new switches in the data center to replace existing infrastructure. The previous network hardware had administrative interfaces that were plugged into the existing network along with all other server hardware on the same subnet. Which of the following should the engineer do to better secure these administrative interfaces?

Options:

A.

Connect the switch management ports to a separate physical network.


B.

Disable unused physical ports on the switches to keep unauthorized users out.


C.

Set the administrative interfaces and the network switch ports on the same VLAN.


D.

Upgrade all of the switch firmware to the latest hardware levels.


Questions # 17:

A large commercial enterprise that runs a global video streaming platform recently acquired a small business that serves customers in a geographic area with limited connectivity to the global telecommunications infrastructure. The executive leadership team issued a mandate to deliver the highest possible video streaming quality to all customers around the world. Which of the following solutions should the enterprise architect suggest to meet the requirements?

Options:

A.

Serve the customers in the acquired area with a highly compressed version of content.


B.

Use a geographically weighted DNS solution to distribute the traffic.


C.

Deploy multiple local load balancers in the newly added geographic area.


D.

Utilize CDN for all customers regardless of geographic location.


Questions # 18:

A cloud engineer is planning to build VMs in a public cloud environment for a cloud migration. A cloud security policy restricts access to the console for new VM builds. The engineer wants to replicate the settings for each of the VMs to ensure the network settings are preconfigured. Which of the following is the best deployment method?

Options:

A.

IaC template


B.

Custom SDK


C.

API script


D.

CLI command


Questions # 19:

A company is expanding its network and needs to ensure improved stability and reliability. The proposed solution must fulfill the following requirements:

    Detection and prevention of network loops

    Automatic configuration of ports

    Standard protocol (not proprietary)

Which of the following protocols is the most appropriate?

Options:

A.

STP


B.

SIP


C.

RTSP


D.

BGP


Questions # 20:

A network architect must ensure only certain departments can access specific resources while on premises. Those same users cannot be allowed to access those resources once they have left campus. Which of the following would ensure access is provided according to these requirements?

Options:

A.

Enabling MFA for only those users within the departments needing access


B.

Configuring geofencing with the IPs of the resources


C.

Configuring UEBA to monitor all access to those resources during non-business hours


D.

Implementing a PKI-based authentication system to ensure access


Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions