Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Nutanix NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Exam Practice Test

Page: 1 / 11
Total 106 questions

Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Questions and Answers

Question 1

An administrator has a requirement to capture application flow data for a policy in Monitor mode and export those events to an external SIEM for correlation with other logs. Which two actions are required to achieve this? (Choose two.)

Options:

A.

Enable IPFIX export on the monitored policy.

B.

Enable Policy Hit Logging on the monitored policy.

C.

Create a Flow Audit Policy on the monitored policy.

D.

Configure a remote syslog destination in Prism Central.

Question 2

When setting up a Network Function VM for Service Insertion, an administrator needs to configure the vNICs that will be used for redirecting traffic. What is the correct configuration for the vNICs on the Network Function VM?

Options:

A.

Two specific Network Function vNICs must be created, one for inbound traffic and the other for outbound traffic.

B.

A single vNIC of type Network Function is required, which handles both ingress and egress traffic.

C.

Two Network Function vNICs are required that must be assigned static IP addresses from a managed IPAM network.

D.

Two standard vNICs are required, one for ingress and one for egress and must be on a trunked VLAN.

Question 3

A customer wants to migrate VMs from a VLAN Basic Subnet to an Overlay Subnet with the same IP prefix. Which migration approach ensures minimal disruption?

Options:

A.

Perform cold migration, acknowledging that ingress/egress connections will not be preserved.

B.

Enable trunk mode on VLAN to allow multiple subnets on the same interface.

C.

Change IPAM mode to unmanaged to allow manual IP assignment.

D.

Create a Layer 2 connectivity between the subnets and perform live migration.

Question 4

What entity is automatically created on the cluster hosting Prism Central when Microsegmentation is enabled?

Options:

A.

A storage container named flow_data is created.

B.

A Bucket named flow_data is created.

C.

A File Share named flow_data is created.

D.

A virtual machine named flow_data is created.

Question 5

An administrator creates a new VPC in No NAT mode to allow VMs in a web tier to reach an external firewall. After deployment... none of the VMs can reach external IP addresses... Which action should the administrator take to restore routed north-south connectivity from the VPC?

Options:

A.

Configure a Flow Security Policy to allow egress traffic from the VPC subnet.

B.

Create an Externally Routable Prefix (ERP) entry for the overlay subnet in the VPC.

C.

Change the VPC mode to NAT so that outbound traffic is automatically translated.

D.

Add a default static route in each VM pointing to the external firewall's IP address.

Question 6

An administrator is configuring a Nutanix environment for Flow Network Security Next-Gen. Where should the MTU be set to ensure that Geneve encapsulation overhead is properly accounted for?

Options:

A.

On the CVM's virtual network interfaces

B.

On the AHV host's physical network interfaces

C.

On the virtual switch within Prism Central

D.

On the upstream virtual router

Question 7

An administrator is building a VPC... VPC CIDR: 10.10.0.0/16 Subnet CIDR: 10.10.10.0/24 "Ext_Net_Ext" (NAT): 192.168.1.0/24 "Ext_Net_Internal" (Routed): 172.16.1.0/24 The on-premises application server has an IP address of 172.16.2.50/24. A VM (10.10.10.100) in the VPC Subnet can reach the internet but cannot reach the on-premises server. Which static route needs to be added to the VPC route table to resolve this?

Options:

A.

Destination prefix: 172.16.2.0/24, Next-Hop: Ext_Net_Ext

B.

Destination Prefix: 10.10.0.0/16, Next-Hop: Ext_Net_Internal

C.

Destination prefix: 192.168.1.0/24 Next-Hop: Ext_Net_Ext

D.

Destination prefix: 172.16.2.0/24, Next-Hop: Ext_Net_Internal

Question 8

During a security review, the administrator confirms that the existing security policy does not explicitly allow traffic from Environment: Development to Environment: Production. A VM in the Development category was still able to reach a Production VM over IPv6. What is the most likely cause of this behavior?

Options:

A.

An isolation policy was incorrectly applied instead of an application policy.

B.

The Allow All IPv6 option in the policy was selected.

C.

The policy was misconfigured and allowed all Layer 2 broadcast traffic.

D.

The VM was using a static IPv6 address.

Question 9

When cloning a Flow Network Security policy, what should be verified before enabling Enforce mode?

Options:

A.

The cloned policy's secured entities reference the intended categories.

B.

The cloned policy is configured to a different scope than the source policy.

C.

The cloned policy must first be saved before it can be enforced.

D.

The cloned policy must be renamed before it can be enforced.

Question 10

An administrator is deploying a new multi-tenant environment in Prism Central and has created a VPC named TenantVPC1. The administrator needs to enable external connectivity for this VPC so that some services inside the VPC can be accessed from the corporate network without NAT translation, while other services require Internet access through SNAT translation. The administrator plans to use an External Network(s) to provision this connectivity. Which configuration should the administrator apply to satisfy this requirement?

Options:

A.

Create two External Networks for TenantVPC1: one NAT (for Internet access) and one Routed/No-NAT (for corporate network access). Attach both to the VPC.

B.

Create two External Networks both of type Routed/No-NAT and attach both to TenantVPC1, one for corporate access and one for internet access.

C.

Create a single External Network of type NAT only and attach it to TenantVPC1. Define SNAT and Floating IPs for both the corporate-network services and internet-facing services.

D.

Create one External Network of type Routed/No-NAT only, attach to TenantVPC1, and configure routing policy to translate IP addresses for internet-facing services.

Question 11

Which two statements are true with respect to Flow Network Security Policies? (Choose two.)

Options:

A.

Flow Network Security is a stateful firewall.

B.

Flow Network Security supports L3 and L4-based firewall rules.

C.

Flow Network Security supports L7-based firewall rules.

D.

Flow Network Security supports rules based on L2 MAC Addresses.

Question 12

In Nutanix Flow, which action transitions a security policy from observing traffic to actively enforcing the rules?

Options:

A.

Disable Traffic Visualization for the policy.

B.

Enforce policy by setting its scope.

C.

Change policy mode from Monitor to Save.

D.

Change policy mode from Monitor to Enforce.

Question 13

What is the additional resource requirement for each Prism Central VM when enabling Flow Virtual Networking on a Small Prism Central deployment?

Options:

A.

2 GB of memory and 1 vCPUs

B.

3 GB of memory and 2 vCPUs

C.

4 GB of memory and 3 vCPUs

D.

5 GB of memory and 4 vCPUs

Question 14

An administrator is designing a VPC for a three-tier application. The workloads must communicate with the Internet using source NAT and also communicate with on-premises networks 10.50.0.0/16 and 172.20.32.0/20 with no address translation. In the Create VPC dialog, the administrator can associate external subnets and specify destination prefixes. Which configuration satisfies the requirements?

Options:

A.

Associate a NONAT external network only; set Destination Prefixes to 0.0.0.0/0.

B.

Associate a NONAT external network for 0.0.0.0/0 and a NAT external network for 10.50.0.0/16, 172.20.32.0/20.

C.

Associate a NAT external network for 0.0.0.0/0 and a NONAT external network for 10.50.0.0/16, 172.20.32.0/20.

D.

Associate a NAT external network only; set Destination Prefixes to 0.0.0.0/0, 10.50.0.0/16, 172.20.32.0/20.

Question 15

While configuring third-party services (Service Insertion) in Flow Network Security Next-Gen, an administrator notices dropped packets when redirecting traffic through a network function. Which configuration change would address this issue?

Options:

A.

Reduce the MTU size to 1400 to match Geneve encapsulation.

B.

Disable Geneve tunneling on the virtual switch.

C.

Increase the MTU by an additional 58 bytes for the Geneve header.

D.

Keep the default MTU at 1500. Encapsulation is handled automatically.

Question 16

After creating a BGP session in Flow Virtual Networking, the session status remains down. Which log should an administrator use first in Prism Central to troubleshoot the issue?

Options:

A.

BGP Gateway system logs from the CVM

B.

Prism Central task execution logs

C.

Routing Protocol Logs for the specific BGP session

D.

Network and Security event logs related to connectivity changes

Question 17

Which two options are supported as a Secured Entity in Flow Network Security Application Policies? (Choose two.)

Options:

A.

Subnet Category

B.

vNIC Category

C.

VPC Category

D.

VG Category

Question 18

Exhibit:

Question # 18

A VM with IP address 172.20.9.5 resides on a subnet with CIDR 172.20.9.0/24. The VPC is successfully peered via BGP with an external router... External networks outside the VPC are unable to reach the VM. What configuration change should be made to enable reachability for the VM?

Options:

A.

Modify the ERP values within the VPC to advertise a CIDR of 172.20.8.0/22

B.

Apply a PBR rule for the VM's address forwarding traffic to the IP of the No-NAT external Gateway address

C.

Apply a default route to the VPC sending all traffic to the NAT External Network

D.

Associate a NAT external network to the VPC and apply a floating IP address to the VM

Question 19

Exhibit:

Question # 19

An administrator has just added a new VPC for Tenant-B... However, users are reporting that they are unable to access external resources from VMs created in the Tenant-B-Prod subnet. What should be done to correct the problem?

Options:

A.

Update the ERPs for Tenant-B-VPC.

B.

Add a Network Policy in Tenant-B-VPC.

C.

Add a Network Policy in Transit-VPC.

D.

Update the ERPs for Transit-VPC.

Question 20

Which policy type takes highest precedence in Enforce mode?

Options:

A.

Application

B.

Isolation

C.

Quarantine

D.

Shared Service

Question 21

What type of policy would be used to block all traffic between VMs in the category Environment:Sandbox and VMs in the category Environment:Production?

Options:

A.

Quarantine Policy

B.

Application Policy

C.

Isolation Policy

D.

Shared Services Policy

Question 22

An administrator manages a four-node cluster Each node has a 4 available 10GB uplinks, and all four are configured as an Active/Active bundle. They want to use Flow Virtual Networking to provide networking to the VMs in the cluster with the following requirements: VMs should be in a single VPC. VMs should be reachable by their real IP addresses. The VPC should have access to the most north/south bandwidth possible. No changes can be made to the physical infrastructure. How can this best be achieved?

Options:

A.

Create a VPC with a single No-NAT External Network with three gateway nodes.

B.

Create a VPC with four No-NAT External Networks, each with a single gateway node.

C.

Create a VPC with a single No-NAT External Network with four gateway nodes.

D.

Create a VPC with a single NAT External Network with three gateway nodes.

Question 23

Which step is required before placing the Flow Network Security software bundle on a local web server?

Options:

A.

Perform an inventory on the Nutanix cluster before transferring any bundle files to the web server.

B.

Extract the downloaded bundle using 7zip and upload it directly to Prism Central.

C.

Enable Direct Upload in Life Cycle Manager so the bundles can be transferred automatically to the Nutanix cluster.

D.

Set up a local web server and download both the required software LCM bundle and compatibility bundle.

Question 24

An administrator has configured a VPC with multiple overlay subnets and attached a VPN gateway using IPSec. After enabling Jumbo Frames on the physical network, VMs are still experiencing packet drops. What is the most likely reason?

Options:

A.

MTU on guest VMs exceeds recommended size for IPSec.

B.

DHCP relay is misconfigured.

C.

Jumbo frames are not supported on overlay subnets.

D.

Floating IP is missing on the VPN gateway.

Question 25

An administrator is deploying a multi-tier application on a Nutanix AHV cluster. The Web tier needs to be accessible from the internet, the App tier must communicate only with the Web tier and the Database tier, and the Database tier should accept traffic only from the App tier. The administrator must determine the correct configuration to ensure secure, reliable connectivity for the Web tier while maintaining isolation from the Internet for the App and Database tiers. Which connectivity option should the administrator implement to meet the requirements?

Options:

A.

Assign direct external IPs to all VMs in the VPC.

B.

Use overlay networks for the Web tier to provide internet access.

C.

Assign Floating IP assignments to Web tier only.

D.

Connect all tiers directly to the external network with no NAT.

Question 26

What must an administrator do before disabling the Network Controller?

Options:

A.

Convert external subnets into VLAN Basic networks.

B.

Delete VLAN Basic Subnets.

C.

Once enabled, the Network controller cannot be disabled.

D.

Delete all external subnets and VPCs which are in-use.

Question 27

An administrator has a VPC with multiple overlay subnets and a VPN gateway configured for site-to-site connectivity. During testing, the administrator noticed fragmented packets and poor performance. Which configuration change resolves this issue without disabling VPN?

Options:

A.

Increase MTU to 1500 on guest VMs

B.

Enable jumbo frames on VLAN subnets

C.

Reduce MTU to 1356 on guest VMs

D.

Disable Geneve encapsulation

Question 28

Which step is required to prepare an AHV cluster for Flow Virtual Networking?

Options:

A.

Assign all VMs to a single VLAN before enabling Flow.

B.

Configure static routes for all overlay networks before enabling Flow.

C.

Disable all existing microsegmentation policies to allow virtual networking.

D.

Ensure all CVMs have network connectivity to Prism Central.

Question 29

An administrator must delegate management of a single tenant VPC to a junior engineer. The engineer should be able to modify that VPC but must not see or change any other VPCs or networking configurations in Prism Central. The administrator wants to meet this requirement using RBAC. Which action should the administrator take to meet this requirement?

Options:

A.

Assign the Network Infrastructure Admin role and restrict its scope to the desired VPC.

B.

Assign the VPC Admin role and restrict its scope to the desired VPC.

C.

Assign a Custom Role cloned from Network Infrastructure Admin and restrict its scope to the desired VPC.

D.

Assign a Custom Role cloned from VPC Admin and restrict its scope to the desired VPC.

Question 30

A new multi-tier application is being deployed across several subnets in a Nutanix environment. The security team wants to create a Flow Network Security Policy to restrict traffic between the tiers, but the complete matrix of required network ports and protocols is not fully documented. Which strategy should the team employ first to accurately capture the necessary communication patterns without risking application outage?

Options:

A.

Create an IPFIX export of all the application traffic and monitor all traffic for 48 hours.

B.

Apply a Security policy in Monitor mode to discover all traffic between the application tiers.

C.

Create broad Security Policy to permit all TCP traffic between the tiers to ensure connectivity.

D.

Apply a Security Policy in Enforce mode adding the required flows as they appear in the flow logs.

Question 31

A junior network operator is assigned two predefined roles in Prism Central... Role A: Prism Viewer Role B: VPC Admin The operator reports being able to successfully create, update, and delete Virtual Private Clouds (VPCs). However, the operator is unable to create a VM into the VPC. How does Prism Central determine the operator's effective permissions?

Options:

A.

The system applies the principle of "most privilege," granting the highest level of access from any assigned role.

B.

The permissions of the VPC Admin role override the more restrictive Prism Viewer role.

C.

The Prism Viewer role's permissions take precedence, preventing any write operations from the VPC Admin role.

D.

The permissions are the union of both roles, granting VPC management rights and global read-only access.

Page: 1 / 11
Total 106 questions