Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Nutanix NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Exam Practice Test

Demo: 31 questions
Total 106 questions

Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Questions and Answers

Question 1

Which step is required before placing the Flow Network Security software bundle on a local web server?

Options:

A.

Perform an inventory on the Nutanix cluster before transferring any bundle files to the web server.

B.

Extract the downloaded bundle using 7zip and upload it directly to Prism Central.

C.

Enable Direct Upload in Life Cycle Manager so the bundles can be transferred automatically to the Nutanix cluster.

D.

Set up a local web server and download both the required software LCM bundle and compatibility bundle.

Question 2

An administrator notices that several VMs in a Nutanix AHV cluster are intermittently losing network connectivity. In Prism Central, a critical alert appears: "Network Function VM (NFVM) packet processing delays" What is the next step that the administrator should take for this issue?

Options:

A.

Review the Alerts and Events in Prism Central to confirm if the affected host shows NIC or uplink errors.

B.

Reboot the affected VMs to re-establish virtual NIC connections.

C.

Increase the MTU size on all virtual switches to improve packet throughput.

D.

Disable all Flow policies on the cluster to eliminate microsegmentation as the cause.

Question 3

An administrator recently deployed a new set of virtual machines... 3-tier web application... restricted as follows: Only application VMs can talk to database VMs on port 3306 Frontend VMs should only communicate with application VMs on port 8080 Which action will correctly create and configure the Security Policies in Nutanix Flow to satisfy this task?

Options:

A.

Create VLANs for each tier and configure ACLs to restrict communication.

B.

Create IP-based rules for each VM category within a Security Policy.

C.

Configure a global "Allow All" Security Policy and rely on guest OS firewalls for tier-based restrictions.

D.

Create categories for each tier then define an Application Policy allowing specific ports between them.

Question 4

An administrator has deployed a microsegmentation policy in Nutanix Flow that allows certain VM traffic based on Active Directory (AD) user group membership. Users in a specific AD group report they are unable to access the VMs, while other users can connect without issues. The administrator suspects the problem is related to identity-based policy mapping. What should the administrator do to troubleshoot and resolve the access issue related to the identity-based policy?

Options:

A.

Add the IP addresses of the blocked VMs to the Inbound ruleset.

B.

Ensure the VMs are associated to the proper AD group categories.

C.

Reboot all VMs associated with the policy to refresh their security group mapping.

D.

Verify that the affected users are members of the mapped AD group.

Question 5

An administrator needs to isolate communication between VMs in Production and Development environments. Each VM is categorized by Environment and Site category values. The administrator wants this isolation to apply only to VMs located at Site: Branch-001. Which configuration best meets the requirement?

Options:

A.

Create a Quarantine Policy between Environment:Production and Environment:Development. Scope the policy to Site: Branch-001.

B.

Create a Quarantine Policy blocking traffic between (Environment: Production + Site: Branch-001) and (Environment: Development + Site: Branch-001).

C.

Create an Isolation Policy between Environment:Production and Environment:Development. Scope the policy to Site: Branch-001.

D.

Create an Isolation Policy blocking traffic between (Environment: Production + Site: Branch-001) and (Environment: Development + Site: Branch-001).

Question 6

Which action allows an administrator to reuse a single existing policy in a different scope?

Options:

A.

Place policy in Enforce mode

B.

Clone

C.

Place policy in Monitor mode

D.

Export

Question 7

Before creating a new Application Security Policy in Prism Central, what prerequisite must exist?

Options:

A.

A category key/value pair must be defined for use in the policy.

B.

Flow Network Security must be enabled on all registered clusters.

C.

Targeted VMs must have category assignments.

D.

The Network Controller must be deployed on each cluster in the policy's scope.

Question 8

An administrator creates a new VPC in No NAT mode to allow VMs in a web tier to reach an external firewall. After deployment... none of the VMs can reach external IP addresses... Which action should the administrator take to restore routed north-south connectivity from the VPC?

Options:

A.

Configure a Flow Security Policy to allow egress traffic from the VPC subnet.

B.

Create an Externally Routable Prefix (ERP) entry for the overlay subnet in the VPC.

C.

Change the VPC mode to NAT so that outbound traffic is automatically translated.

D.

Add a default static route in each VM pointing to the external firewall's IP address.

Question 9

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

Options:

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Question 10

A service-insertion firewall VM protects user VMs access to the internet. The virtual and physical switches, as well as all user VMs, currently use the default MTU size of 1500. Everything functions normally until a user VM is migrated to another host. After the migration, the user reports that some websites fail to load while ping to those same sites still succeeds. Routing and security policies appear normal. Which two configuration changes could resolve the issue? (Choose two.)

Options:

A.

Increase the MTU across all vSwitch and physical uplinks on the relevant network path to 1558 or greater.

B.

Lower the MTU across all vSwitch and physical uplinks on the relevant network path to 1442 or lower.

C.

Decrease the MTU on the user VM's vNIC to 1442 or lower.

D.

Increase the MTU on the user VM's vNIC to 1558 or greater.

Question 11

An administrator finds that App tier VMs cannot connect to the Database tier on port 3306, and Flow logs show the traffic is being denied by a security policy. The Web tier communicates normally. What should the administrator do to allow the App tier to access the Database tier?

Options:

A.

Update the microsegmentation policy in Nutanix Flow to allow App - > Database traffic on port 3306.

B.

Delete all existing Flow policies and recreate them from scratch.

C.

Enable NAT for the Database tier to allow connections from the App tier.

D.

Change the Database tier subnet to match the App tier subnet.

Question 12

What happens when a monitored policy is enforced?

Options:

A.

Stops logging traffic

B.

Blocks all traffic that is not allowed

C.

Deletes the policy hitlogs

D.

Removes all discovered flows

Question 13

An administrator wants to configure the subnet 10.1.1.0/24 to stretch across two VPCs over a Network Gateway in VXLAN mode. The VMs on this subnet need to communicate with a traffic pattern of size 2000 Bytes. What is the minimum MTU required in the underlay network to ensure communication happens without fragmentation or traffic drops?

Options:

A.

2058 Bytes

B.

2108 Bytes

C.

2116 Bytes

D.

9216 Bytes

Question 14

An administrator needs to ensure all web traffic (HTTP/HTTPS) from a specific subnet (10.100.20.0/24) is redirected through a third-party virtual firewall inside the VPC for Layer 7 inspection before reaching the internet. The firewall VM has an IP of 10.100.30.5 and is connected to a different subnet. What should be done to enforce this specific traffic path?

Options:

A.

Configure a Policy-Based Route (PBR) on the VPC with a re-route IP 10.100.30.5.

B.

Create a FNS policy with an allow rule for the FW IP 10.100.30.5.

C.

Move the Firewall VM into the same subnet and set the default GW of the web servers to 10.100.30.5.

D.

Create a Network Policy with a high priority with the source 10.100.20.0/24, destination of 10.100.30.5 on port 80 & 443.

Question 15

What entity is automatically created on the cluster hosting Prism Central when Microsegmentation is enabled?

Options:

A.

A storage container named flow_data is created.

B.

A Bucket named flow_data is created.

C.

A File Share named flow_data is created.

D.

A virtual machine named flow_data is created.

Question 16

A VM with IP address 172.20.10.5 on a Subnet with CIDR 172.20.10.0/24 is unable to be routed externally from the VPC. The VPC is successfully peered via BGP... However, when checking the BGP Session, no routes are being advertised by the VPC. What is the most likely configuration issue?

Options:

A.

There is no default route within the VPC to send traffic to the NAT external network.

B.

The VM does not have a Floating IP assigned to allow external connectivity.

C.

The VPC does not have a NO-NAT network configured to advertise the routes.

D.

A network Policy is blocking outbound access for the VM.

Question 17

While configuring third-party services (Service Insertion) in Flow Network Security Next-Gen, an administrator notices dropped packets when redirecting traffic through a network function. Which configuration change would address this issue?

Options:

A.

Reduce the MTU size to 1400 to match Geneve encapsulation.

B.

Disable Geneve tunneling on the virtual switch.

C.

Increase the MTU by an additional 58 bytes for the Geneve header.

D.

Keep the default MTU at 1500. Encapsulation is handled automatically.

Question 18

An administrator is building a new VPC in Prism Central to isolate a test environment. The administrator plans to connect it to an external network later, but they want to complete the initial creation first. Which configuration items are the minimum required to successfully create the VPC?

Options:

A.

VPC name and one External Access VLAN

B.

VPC name and Transit VPC toggle switch

C.

VPC name and one Overlay Subnet

D.

VPC name and cluster selection

Question 19

An administrator has configured two VPCs with overlapping externally routable prefixes (ERPs). The two VPCs are associated to separate external networks that are part of the same physical routing domain. What outcome should the administrator expect?

Options:

A.

Routing conflicts and unreachable external paths

B.

NAT is always automatically enforced

C.

Prefixes are merged into a single advertised route

D.

The larger prefix takes priority automatically

Question 20

An administrator has two user VPCs connected via a Transit VPC. Routing works for most subnets, but one overlay subnet cannot reach external networks. What is the most probable cause?

Options:

A.

Incorrect ASN in the BGP configuration in the Transit VPC

B.

Mismatch in ERP configuration in user and Transit VPC

C.

Floating IP not assigned to the gateway

D.

DHCP configuration is disabled on the overlay subnet in the user VPC

Question 21

An administrator is responsible for managing user access to a Nutanix cluster... configure custom user roles... What is the first step in configuring and managing user roles for a Nutanix cluster?

Options:

A.

Create the requisite Authorization Polices from custom or built-in roles.

B.

Modify the administrator role to restrict access to critical system functions.

C.

Disable default roles and create new roles for each team.

D.

Create the requisite Custom Roles from custom or built-in Authorization Polices.

Question 22

An administrator has created a VPC with the following subnets: 10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 What action must be taken for these networks to be externally routable?

Options:

A.

Assign a No-NAT External Network & ERP 10.1.0.0/22

B.

Assign a No-NAT External Network & ERP 10.1.0.0/23

C.

Assign a NAT External Network & ERP 10.1.0.0/22

D.

Assign a NAT external network & ERP 10.1.0.0/23

Question 23

A new multi-tier application is being deployed across several subnets in a Nutanix environment. The security team wants to create a Flow Network Security Policy to restrict traffic between the tiers, but the complete matrix of required network ports and protocols is not fully documented. Which strategy should the team employ first to accurately capture the necessary communication patterns without risking application outage?

Options:

A.

Create an IPFIX export of all the application traffic and monitor all traffic for 48 hours.

B.

Apply a Security policy in Monitor mode to discover all traffic between the application tiers.

C.

Create broad Security Policy to permit all TCP traffic between the tiers to ensure connectivity.

D.

Apply a Security Policy in Enforce mode adding the required flows as they appear in the flow logs.

Question 24

Which two statements are true with respect to Flow Network Security Policies? (Choose two.)

Options:

A.

Flow Network Security is a stateful firewall.

B.

Flow Network Security supports L3 and L4-based firewall rules.

C.

Flow Network Security supports L7-based firewall rules.

D.

Flow Network Security supports rules based on L2 MAC Addresses.

Question 25

An administrator has a VPC with a single active gateway node that successfully peers with an external router using a single BGP GW and session. To eliminate a single point of failure, the administrator deploys a second BGP gateway to the VPC. After the second gateway is added and shows a healthy state, the external router still only sees a single BGP session. What is the most likely reason for the second session not being established on the external router?

Options:

A.

The BGP Hold-down timer on the external router is set too high.

B.

Network Security Groups are blocking BGP traffic from the second gateway's IP address.

C.

The external router needs BGP peering configuration pointing to the IP address of the first gateway node.

D.

The second BGP gateway requires a BGP session configured to peer with the external router.

Question 26

An administrator plans to upgrade a Nutanix cluster running AHV and Prism Central. The current cluster is on AOS 6.10, and the administrator wants to move to AOS 7.3 while ensuring all components remain compatible. What is the correct upgrade order to minimize downtime and maintain cluster functionality?

Options:

A.

Upgrade CVMs - > Upgrade cluster AOS - > Upgrade Prism Central - > Upgrade AHV hosts

B.

Upgrade cluster AOS - > Upgrade AHV hosts - > Upgrade Prism Central - > Upgrade CVMs

C.

Upgrade Prism Central - > Upgrade AHV hosts - > Upgrade CVMs - > Upgrade cluster AOS

D.

Upgrade AHV hosts - > Upgrade cluster AOS - > Upgrade Prism Central - > Upgrade CVMs

Question 27

An administrator is designing a new Transit VPC to service multiple Tenant VPCs. While adding subnets, the administrator must choose the correct network type supported by Flow Virtual Networking for this VPC. Which network type is supported for subnets inside a Transit VPC in Flow Virtual Networking?

Options:

A.

Overlay subnets

B.

VLAN Basic subnets

C.

VLAN subnets

D.

VXLAN subnets

Question 28

An administrator has been tasked with creating a security policy to protect specific virtual network interfaces (vNICs) within a VM in a Flow Virtual Networking setup. How can the administrator ensure that only a specific vNIC is protected by the policy?

Options:

A.

Apply the policy to the VM, and then use network segmentation to isolate the vNIC.

B.

Use subnet categorization to create a vNIC-specific policy, securing the selected vNIC based on its associated subnet.

C.

Configure an entity group with a VM and a subnet, and apply the policy to the entity group, including categories for both VM and subnet.

D.

Create a general policy for all vNICs and assign it to the VM. The system will automatically select the vNIC to protect.

Question 29

An administrator has a requirement to capture application flow data for a policy in Monitor mode and export those events to an external SIEM for correlation with other logs. Which two actions are required to achieve this? (Choose two.)

Options:

A.

Enable IPFIX export on the monitored policy.

B.

Enable Policy Hit Logging on the monitored policy.

C.

Create a Flow Audit Policy on the monitored policy.

D.

Configure a remote syslog destination in Prism Central.

Question 30

Which policy mode records traffic without enforcing rule actions?

Options:

A.

Enforce

B.

Monitor

C.

Isolate

D.

Save

Question 31

An administrator is deploying a multi-tier application on a Nutanix AHV cluster. The Web tier needs to be accessible from the internet, the App tier must communicate only with the Web tier and the Database tier, and the Database tier should accept traffic only from the App tier. The administrator must determine the correct configuration to ensure secure, reliable connectivity for the Web tier while maintaining isolation from the Internet for the App and Database tiers. Which connectivity option should the administrator implement to meet the requirements?

Options:

A.

Assign direct external IPs to all VMs in the VPC.

B.

Use overlay networks for the Web tier to provide internet access.

C.

Assign Floating IP assignments to Web tier only.

D.

Connect all tiers directly to the external network with no NAT.

Demo: 31 questions
Total 106 questions