Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CNX-001 Exam Dumps - CompTIA CloudNetX Exam

Go to page:
Question # 9

A network architect needs to build a new data center for a large company that has business units that process retail financial transactions. Which of the following information should the architect request from the company?

A.

Regulatory requirements

B.

Statement of work

C.

Business case study

D.

Internal reference architecture

Full Access
Question # 10

A network engineer is establishing a wireless network for handheld inventory scanners in a manufacturing company's warehouse. The engineer needs an authentication mechanism for these scanners that uses the Wi-Fi network and works with the company's Active Directory. The business requires that the solution authenticate the users and authorize the scanners. Which of the following provides the best solution for authentication and authorization?

A.

TACACS+

B.

RADIUS

C.

LDAP

D.

PKI

Full Access
Question # 11

A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0/8. Which of the following is the best solution?

A.

Allocate 10.1.0.0/30 to the IT department. Allocate 10.2.0.0/16 to the sales department.

B.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/24 to the sales department.

C.

Allocate 10.1.0.0/22 to the IT department. Allocate 10.2.0.0/15 to the sales department.

D.

Allocate 10.1.0.0/16 to the IT department. Allocate 10.2.1.0/25 to the sales department.

Full Access
Question # 12

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Full Access
Question # 13

A SaaS company's new service currently is being provided through four servers. The company's end users are having connection issues, which is affecting about 25% of the connections. Which of the following is most likely the root cause of this issue?

A.

The service is using round-robin load balancing through a DNS server with one server down.

B.

The service is using weighted load balancing with 40% of the traffic on server A, 20% on server B, 20% on server C, and server D is down.

C.

The service is using a least-connection load-balancing method with one server down.

D.

Load balancing is configured with a health check in front of these servers, and one of these servers is unavailable.

Full Access
Question # 14

An administrator needs to add a device to the allow list in order to bypass user authentication of an AAA system. The administrator uses MAC filtering and needs to discover the device's MAC address to accomplish this task. The device receives an IP address from DHCP, but the IP address changes daily. Which of the following commands should the administrator run on the device to locate its MAC address?

A.

ipconfig /all

B.

netstat -an

C.

arp -a

D.

nslookup

Full Access
Question # 15

A SaaS company is launching a new product based in a cloud environment. The new product will be provided as an API and should not be exposed to the internet. Which of the following should the company create to best meet this requirement?

A.

A transit gateway that connects the API to the customer's VPC

B.

Firewall rules allowing access to the API endpoint from the customer's VPC

C.

A VPC peering connection from the API VPC to the customer's VPC

D.

A private service endpoint exposing the API endpoint to the customer's VPC

Full Access
Question # 16

An administrator must ensure that credit card numbers are not contained in any outside messaging or file transfers from the organization. Which of the following controls meets this requirement?

A.

Intrusion detection system

B.

Egress filtering

C.

Data loss prevention

D.

Encryption in transit

Full Access
Go to page: