00:00

QUESTION 6

A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0/8. Which of the following is the best solution?

Correct Answer: C
A /22 gives you 1,022 usable addresses, ample headroom for 200 IT laptops, while a /15 yields 32,766 addresses, covering up to 2,000 sales laptops with room to grow, all within the 10.0.0.0/8 space.

QUESTION 7

A user reports an issue connecting to a database server. The front-end application for this database is hosted on the company's web server. The network engineer has changed the network subnet that the company servers are located on along with the IP addresses of the servers. These are the new configurations:
CNX-001 dumps exhibit
New subnet for the servers is 10.10.10.64/27
CNX-001 dumps exhibit
Web server IP address is 10.10.10.101
CNX-001 dumps exhibit
Database server IP is 10.10.10.93
Which of the following ismostlikely causing the user's issue?

Correct Answer: D
With a /27 mask on 10.10.10.64/27, valid host addresses run from 10.10.10.65 through 10.10.10.94. The database server??s IP (10.10.10.93) is in that range, but the web server??s IP (10.10.10.101) falls outside it—so it??s mis-configured and cannot reach the database.

QUESTION 8

As part of a project to modernize a sports stadium and improve the customer service experience for fans, the stadium owners want to implement a new wireless system. Currently, all tickets are electronic and managed by the stadium mobile application. The new solution is required to allow location tracking precision within 5ft (1.5m) of fans to deliver the following services:
✑ Emergency/security assistance
✑ Mobile food order
✑ Event special effects
✑ Raffle winner location displayed on the giant stadium screen
Which of the following technologies enables location tracking?

Correct Answer: B
BLE (Bluetooth Low Energy) is a wireless personal area network (WPAN) technology designed for applications that require lower energy consumption and reduced cost while maintaining a communication range similar to classic Bluetooth. BLE supportslocation tracking with an accuracy range typically between 1 to 2 meters (approximately 3 to 6 feet), making it ideal for applications that demandfine-grained location services, such as stadium services requiring real-time user proximity data.
According to theCompTIA CloudNetX CNX-001 Official Objectives, under theNetwork Architecture domain, specifically in the subdomain:
"Wireless Technologies: Identify capabilities of BLE, NFC, RFID, and IoT devices within a network environment,"it is outlined that:
✑ "BLE enables proximity-based services and real-time indoor location tracking with
high accuracy when used with beacon infrastructure."
✑ "BLE beacons can be deployed throughout a physical space, transmitting signals received by mobile applications to determine a user??s location within a few feet."
✑ "BLE is widely adopted for use cases including indoor navigation, asset tracking, and personalized user engagement, making it a critical technology for modern high-density venues such as stadiums."
In comparison:
✑ SSIDmerely identifies a wireless network and has no location tracking function.
✑ NFCrequires close contact (under 4 cm), and is not suitable for continuous or broad-range tracking.
✑ IoTis an overarching category that includes connected devices and sensors; however, IoT is not a standalone location tracking technology. It may include BLE as a component, butBLE specifically provides the precise location tracking functionality.
These distinctions are explicitly addressed in theCompTIA CloudNetX CNX-001 Study Guide, under the section:
✑ ??Emerging Network Technologies and Architectures??, where BLE is described as a
key enabling technology for context-aware and location-based services in enterprise and public environments.

QUESTION 9

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

Correct Answer: D
Assign each of the three original nodes a weight of 1 and the new high-performance node a weight of 3. With weighted balancing, the new node will receive 3 / (1 + 1 + 1 + 3) = 50% of traffic - equal to the combined load on the other three.

QUESTION 10

A network administrator is troubleshooting an outage at a remote site. The administrator examines the logs and determines that one of the internet links at the site appears to be
down. After the service provider confirms this information, the administrator fails over traffic to the backup link. Which of the following should the administrator do next?

Correct Answer: D
After implementing the failover solution, you should confirm that all services and network paths are fully restored and operating correctly before closing the ticket.