Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CNX-001 Questions and Answers

Question # 6

A network architect is designing a new network for a rural hospital system. Given the following requirements:

    Highly available

    Consistent data transmission

    Resilient to simultaneous failures

Which of the following topologies should the architect use?

A.

Collapsed core

B.

Hub-and-spoke

C.

Mesh

D.

Star

Full Access
Question # 7

A network administrator is configuring firewall rules to lock down the network from outside attacks. Which of the following should the administrator configure to create the most strict set of rules?

A.

URL filtering

B.

File blocking

C.

Network security group

D.

Allow List

Full Access
Question # 8

A network architect needs to design a new network to connect multiple private data centers. The network must:

    Provide privacy for all traffic between locations

    Use preexisting internet connections

    Use intelligent steering of application traffic over the best path

Which of the following best meets these requirements?

A.

MPLS connections

B.

SD-WAN

C.

Site-to-site VPN

D.

ExpressRoute

Full Access
Question # 9

A global company has depots in various locations. A proprietary application was deployed locally at each of the depots, but issues with getting the consolidated data instantly occurred. The Chief Information Officer decided to centralize the application and deploy it in the cloud. After the cloud deployment, users report the application is slow. Which of the following is most likely the issue?

A.

Throttling

B.

Overutilization

C.

Packet loss

D.

Latency

Full Access
Question # 10

A company hosts its applications on the cloud and is expanding its business to Europe. Thecompany must comply with General Data Protection Regulation (GDPR) to limit European customers' access to data. The network team configures the firewall rules but finds that some customers in the United States can access data hosted in Europe. Which of the following is the best option for the network team to configure?

A.

SASE

B.

Network security groups

C.

CDN

D.

Geofencing rule

Full Access
Question # 11

A company is transitioning from on-premises to a hybrid environment. Due to regulatory standards, the company needs to achieve a high level of reliability and high availability for the connection between its data center and the cloud provider. Which of the following solutions best meets the requirements?

A.

Establish a Direct Connect with the cloud provider and peer to two different VPCs in the cloud network.

B.

Establish a Direct Connect with the cloud provider and a redundant connection with a VPN over the internet.

C.

Establish two Direct Connect connections to the cloud provider using two different suppliers.

D.

Establish a VPN with two tunnels to a transit gateway at the cloud provider.

Full Access
Question # 12

A company deployed new applications in the cloud and configured a site-to-site VPN to connect the internal data center with the cloud. The IT team wants the internal servers to connect to those applications without using public IP addresses. Which of the following is the best solution?

A.

Create a DNS server in the cloud. Configure the DNS server in the customer data center to forward DNS requests for cloud resources to the cloud DNS server.

B.

Configure a NAT server on the cloud to allow internal servers to connect to the applications through the NAT server.

C.

Register applications on the cloud with a public DNS server and configure internal servers to connect to them using their public DNS names.

D.

Configure proxy service in the site-to-site VPN to allow internal servers to access applications through the proxy.

Full Access
Question # 13

A cloud architect needs to change the network configuration at a company that uses GitOps to document and implement network changes. The Git repository uses main as the default branch, and the main branch is protected. Which of the following should the architect do after cloning the repository?

A.

Use the main branch to make and commit the changes back to the remote repository.

B.

Create a new branch for the change, then create a pull request including the changes.

C.

Check out the development branch, then perform and commit the changes back to the remote repository.

D.

Rebase the remote main branch after making the changes to implement.

Full Access
Question # 14

A company is replacing reserved public IP addresses with dynamic IP addresses. The network architect creates a list of assets with some dependencies to these reserved IPs:

(Refer to image: Reserved IPs are in use by NSGs, VMs, load balancers, and one is unallocated.)

Which of the following issues may begin to affect cloud assets after the replacement is made?

A.

IP asymmetric routing

B.

IP spoofing

C.

IP exhaustion

D.

IP reuse

Full Access
Question # 15

A network engineer at an e-commerce organization must improve the following dashboard due to a performance issue on the website:

(Refer to the image: Website performance monitoring dashboard showing metrics like network usage, CPU usage, memory usage, and disk usage over time.)

Which of the following is the most useful information to add to the dashboard for the operations team?

A.

404 errors

B.

Concurrent users

C.

Number of orders

D.

Number of active incidents

Full Access
Question # 16

A network architect is choosing design options for a new SD-WAN installation that has the following requirements:

    All network traffic from the cloud must pass through inspection devices in a dedicated data center.

    Ensure redundancy.

    Centralize egress traffic.

Which of the following network topologies best meets these requirements?

A.

Point-to-point

B.

Hub-and-spoke

C.

Star

D.

Partial mesh

Full Access
Question # 17

A network administrator must connect a remote building at a manufacturing plant to the main building via a wireless connection. Which of the following should the administrator choose to get the greatest possible range from the wireless connection? (Choose two.)

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

Omnidirectional antenna

E.

Patch antenna

F.

Built-in antenna

Full Access
Question # 18

A company is expanding its network and needs to ensure improved stability and reliability. The proposed solution must fulfill the following requirements:

    Detection and prevention of network loops

    Automatic configuration of ports

    Standard protocol (not proprietary)

Which of the following protocols is the most appropriate?

A.

STP

B.

SIP

C.

RTSP

D.

BGP

Full Access
Question # 19

A call center company provides its services through a VoIP infrastructure. Recently, the call center set up an application to manage its documents on a cloud application. The application is causing recurring audio losses for VoIP callers. The network administrator needs to fix the issue with the least expensive solution. Which of the following is the best approach?

A.

Adding a second internet link and physically splitting voice and data networks into different routes

B.

Configuring QoS rules at the internet router to prioritize the VoIP calls

C.

Creating two VLANs, one for voice and the other for data

D.

Setting up VoIP devices to use a voice codec with a higher compression rate

Full Access
Question # 20

A cloud engineer is planning to build VMs in a public cloud environment for a cloud migration. A cloud security policy restricts access to the console for new VM builds. The engineer wants to replicate the settings for each of the VMs to ensure the network settings are preconfigured. Which of the following is the best deployment method?

A.

IaC template

B.

Custom SDK

C.

API script

D.

CLI command

Full Access
Question # 21

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Full Access
Question # 22

A network load balancer is not correctly validating a client TLS certificate. The network architect needs to validate the certificate installed on the load balancer before progressing. Which of the following commands should the architect use to confirm whether the private key and certificate match?

A.

openssl-list -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

B.

openssl req -in certificate.csr -verify

openssl-verify -noout -modulus -in privkey.txt | openssl md5

C.

openssl-rsa -noout -modulus -in cert.crt | openssl md5

openssl-verify -noout -modulus -in privkey.txt | openssl md5

D.

openssl x509 -noout -modulus -in cert.crt | openssl md5

openssl rsa -noout -modulus -in privkey.txt | openssl md5

Full Access
Question # 23

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

Full Access
Question # 24

A company hosts a cloud-based e-commerce application and only wants the application accessed from certain locations. The network team configures a cloud firewall with WAF enabled, but users can access the application globally. Which of the following should the network team do?

A.

Reconfigure WAF rules

B.

Configure a NAT gateway

C.

Implement a CDN

D.

Configure geo-restriction

Full Access
Question # 25

A network architect is working on a new network design to better support remote and on-campus workers. Traffic needs to be decrypted for inspection in the cloud but is not required to go through the company's data center. Which of the following technologies best meets these requirements?

A.

Secure web gateway

B.

Transit gateway

C.

Virtual private network

D.

Intrusion prevention system

E.

Network access control system

Full Access