CNX-001 Dumps

CNX-001 Free Practice Test

CompTIA CNX-001: CompTIA CloudNetX Exam

QUESTION 1

A network security administrator needs to set up a solution to: Gather all data from log files in a single location.
Correlate the data to generate alerts.
Which of the following should the administrator implement?

Correct Answer: D
A Security Information and Event Management system centralizes log collection from disparate sources and applies correlation rules to generate actionable alerts.

QUESTION 2

Security policy states that all inbound traffic to the environment needs to be restricted, but all external outbound traffic is allowed within the hybrid cloud environment. A new application server was recently set up in the cloud. Which of the following would most likely need to be configured so that the server has the appropriate access set up? (Choose two.)

Correct Answer: DE
A perimeter firewall enforces the organization??s ??deny inbound by default, allow all outbound?? policy at the edge of the cloud environment, while an Azure-style NSG applies the same rule set at the VM/subnet level. Together they ensure no inbound connections slip through and that outbound traffic remains unrestricted.

QUESTION 3

An organization with an on-premises data center is adopting additional cloud-based solutions. The organization wants to keep communication secure between remote employees' devices and workloads. Which of the following ZTA featuresbestachieves this goal?

Correct Answer: D
Shifting to ??identity as the perimeter?? means that each remote user and device??s identity (and context) becomes the basis for granting secure, encrypted access directly to workloads, regardless of the underlying network, ensuring communications are authenticated and authorized per-session.

QUESTION 4

An administrator logged in to a cloud account on a shared machine but forgot to log out after the session ended. Which of the following types of security threats does this action pose?

Correct Answer: C
By leaving an active session open on a shared machine, an attacker with access to that machine can intercept or hijack the administrator??s session tokens or credentials - classic on-path behavior - allowing them to impersonate the admin without needing elevated exploits.

QUESTION 5

A network security engineer must secure a web application running on virtual machines in a public cloud. The virtual machines are behind an application load balancer. Which of the following technologies should the engineer use to secure the virtual machines? (Choose two.)

Correct Answer: DF
WAF: Protects the web application by inspecting incoming HTTP/HTTPS requests at the load balancer, blocking SQL injection, XSS, and other common web attacks.
NSG: Enforces network-layer controls on the VMs?? subnets or interfaces, allowing only approved ports and IP ranges to reach the application servers.