CompTIA CloudNetX Practice Test 1

CompTIA CloudNetX Practice Exam

1 / 40

Which approach provides the fastest recovery time objective (RTO) for a mission-critical cloud application?

2 / 40

An organization is transitioning to a Zero Trust security model in its cloud infrastructure. What is the most critical component?

3 / 40

Which strategy is most effective for optimizing cloud networking costs without sacrificing performance?

4 / 40

An enterprise is using cloud-based object storage for critical backups. What method ensures the integrity of stored data?

5 / 40

A cloud provider wants to optimize data traffic flow between different availability zones while minimizing latency. What is the best strategy?

6 / 40

What is a key advantage of employing behavior-based threat detection systems in a cloud environment?

7 / 40

Which security measure is considered a cloud-native control?

8 / 40

Which approach best ensures both scalability and redundancy in a cloud network design?

9 / 40

What is the primary benefit of implementing network segmentation within a cloud environment?

10 / 40

An organization is designing a hybrid cloud network to ensure high availability and fault tolerance. Which strategy best achieves this goal?

11 / 40

A development team wants to test an entirely new environment configuration alongside the existing production environment without interfering with it. What environment strategy should they use?

12 / 40

A cloud operations team needs real-time visibility into resource metrics, such as CPU saturation and disk IO, across thousands of nodes. What should they use?

13 / 40

A data processing pipeline must guarantee that once a job begins, it cannot be run again concurrently. What mechanism supports this?

14 / 40

A microservices workload experiences high latency due to services repeatedly fetching the same reference data. What is the best optimization?

15 / 40

A global e-commerce platform needs to ensure that authentication requests go to the closest available region for lowest latency. What solution provides this?

16 / 40

A compliance officer requires proof that certain cloud data has not been modified for ten years. What technology ensures immutability?

17 / 40

A company wants to allow external partners to publish messages into its event stream without granting internal permissions. What should be implemented?

18 / 40

An application performs heavy CPU-bound calculations and requires long-running tasks without interruption. Which compute option is ideal?

19 / 40

A financial auditing service must verify all configuration changes across the environment. What solution best satisfies this?

20 / 40

A developer needs to ensure that a serverless function triggers only when a set of required events completes, not on each individual event. What cloud pattern supports this?

21 / 40

A workload generates 10 TB/day of logs. Costs are increasing due to retained logs in hot storage, but the logs must be searchable for 90 days. What solution is most cost-efficient?

22 / 40

An organization wants to prevent overprivileged accounts and enforce least privilege automatically. Which approach accomplishes this?

23 / 40

A multi-cloud architecture needs unified access control, so administrators can manage permissions across all cloud providers in one place. What solution should be used?

24 / 40

A business requires automatic detection of unusual data flows, such as sudden spikes to unknown IP ranges. What technology supports this requirement?

25 / 40

A distributed application must ensure that writes made to one node are propagated to all other nodes with minimal delay but does NOT require strict locking. Which consistency model is best?

26 / 40

A security team requires that VM images undergo malware scanning before being allowed into the production environment. What should they implement?

27 / 40

An application relies on a high-throughput stream ingestion service. The engineer wants to ensure that consumer processes can pick up exactly where they left off after restarts. What feature ensures this?

28 / 40

A company wants to ensure that infrastructure changes are always tracked and reversible. What should they implement?

29 / 40

A machine learning pipeline requires fast retrieval of training data stored in structured format with SQL-like querying capabilities. Which storage architecture is most appropriate?

30 / 40

A cloud architect needs to ensure that a newly deployed cluster of microservices can automatically discover each other without hardcoding IP addresses. Which technology should be implemented?

31 / 40

You must ensure every deployed container image can be traced back to the exact source commit and build input. What should the pipeline produce?

32 / 40

A cluster needs patching with zero downtime. Which approach fits?

33 / 40

A large CI/CD pipeline requires that container images are reproducible and traceable to each build and code commit. What practice ensures this?

34 / 40

Your organization wants to detect zero-day attacks and unusual behaviors across cloud infrastructure using adaptive models rather than static rules. Which capability should you add?

35 / 40

A Kubernetes environment requires policies that ensure containers do not run as root and must use read-only filesystem mounts where applicable. Where should these controls be enforced centrally?

36 / 40

A security control requires that even if a cloud provider is compromised, tenant data keys must remain secret to the tenant. Which key-management model enforces this strongest separation?

37 / 40

A streaming analytics pipeline needs to handle backpressure when downstream consumers lag while preventing unbounded memory growth on producers. Which mechanism is appropriate?

38 / 40

A DevOps team must ensure every infrastructure change is reviewed before applying to production. What pipeline feature enforces that policy automatically?

39 / 40

A cloud architect wants to minimize inter-region read latency for global users while ensuring each region’s dataset can be updated independently for local compliance. Which pattern balances latency and regional control?

40 / 40

An application must allow users to upload large media files directly to cloud object storage from clients without exposing storage credentials. What pattern secures this flow?

Your score is

The average score is 71%

0%