Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Questions and Answers

Questions 4

An administrator needs to make a web server VM, which is inside a private VPC overlay subnet, accessible from the external network. The administrator assigns a Floating IP to the VM, but the service is still unreachable from the outside. What is a likely reason for this failure?

Options:

A.

A Floating IP was assigned from a different external subnet than the one used by the VPC.

B.

The VPC has no default route configured to use the external subnet.

C.

The VM was not rebooted after the Floating IP was assigned.

D.

The web server VM is not running the latest version of NGT.

Buy Now
Questions 5

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

Options:

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Buy Now
Questions 6

Refer to Exhibit:

NCP-NS-7.5 Question 6

How should an Application Policy be created whose rules apply only to vNIC1 of VM1?

Options:

A.

Create an Entity Group with Cat:SubnetA and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

B.

Add Cat:SubnetA as secured entity in the Application Policy.

C.

Create an Entity Group with Cat:SubnetA, Cat:SubnetB and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

D.

Add Cat:SubnetA and Cat:VM1 as secured entity in the Application Policy.

Buy Now
Questions 7

What must an administrator do before disabling the Network Controller?

Options:

A.

Convert external subnets into VLAN Basic networks.

B.

Delete VLAN Basic Subnets.

C.

Once enabled, the Network controller cannot be disabled.

D.

Delete all external subnets and VPCs which are in-use.

Buy Now
Questions 8

A VM with IP address 172.20.10.5 on a Subnet with CIDR 172.20.10.0/24 is unable to be routed externally from the VPC. The VPC is successfully peered via BGP... However, when checking the BGP Session, no routes are being advertised by the VPC. What is the most likely configuration issue?

Options:

A.

There is no default route within the VPC to send traffic to the NAT external network.

B.

The VM does not have a Floating IP assigned to allow external connectivity.

C.

The VPC does not have a NO-NAT network configured to advertise the routes.

D.

A network Policy is blocking outbound access for the VM.

Buy Now
Questions 9

An administrator plans to upgrade the Network Controller in a Flow Virtual Networking deployment. The environment includes multiple AHV clusters managed by Prism Central. Which prerequisite must be verified before upgrading the Network Controller?

Options:

A.

Flow Network Security must be upgraded to the target release before upgrading the Network Controller.

B.

Each cluster must be running the Flow Network Security version specified as compatible with the target Network Controller release.

C.

Each cluster must be running AHV versions compatible with the target Network Controller release.

D.

Network Controller Prism Element upgrades must be applied before before Network Controller Prism Central upgrades can be applied.

Buy Now
Questions 10

Refer to Exhibit:

NCP-NS-7.5 Question 10

An organization uses an FNS-NG Service Chain to steer application traffic through a pair of third-party firewall Network Function VMs operating in Active/Standby mode. Users suddenly report that all application access is blocked. The administrator reviews Prism Central - > Network & Security - > Network Functions, where the summary shown in the exhibit is displayed. Additional information: Alert: "Network Function 'PANW Service Insertion' virtual NIC pair(s) are unhealthy." Both firewall VMs are powered on and reachable. The security policy using the service chain has not been changed. Based on the exhibit and findings, what is the most likely cause of the traffic outage?

Options:

A.

The service-chain health check failed to reroute sessions to the healthy firewall.

B.

One of the Network Function vNIC pairs lost dataplane connectivity, interrupting traffic until health is stabilized.

C.

Firewall policy synchronization was not configured when the standby firewall became active.

D.

The inbound vNIC on SE-PA-VM Firewall-2 failed, preventing redirected packets from reaching the firewall.

Buy Now
Questions 11

Before creating a new Application Security Policy in Prism Central, what prerequisite must exist?

Options:

A.

A category key/value pair must be defined for use in the policy.

B.

Flow Network Security must be enabled on all registered clusters.

C.

Targeted VMs must have category assignments.

D.

The Network Controller must be deployed on each cluster in the policy's scope.

Buy Now
Questions 12

A VPC admin creates a policy to allow traffic between two IP subnets but forgets to enable reverse direction. What happens in this scenario?

Options:

A.

Traffic is blocked completely because the policy is invalid.

B.

Policy is rejected by Prism Central during validation.

C.

Traffic flows bidirectionally because policies are stateful by default.

D.

Traffic flows only in one direction, blocking return traffic.

Buy Now
Questions 13

While configuring a new security policy in a Nutanix microsegmentation environment, an administrator wants the policy to remain flexible even if virtual machines change subnets or obtain new IP addresses. Which configuration approach should the administrator use when defining the policy scope?

Options:

A.

Configure the policy only on specific VLAN IDs.

B.

Use VM categories to define the secured and allowed entities.

C.

Apply the policy after setting static routes for each VM.

D.

Assign IP addresses manually to all VMs included in the policy.

Buy Now
Questions 14

An administrator has been tasked with configuring virtual switches and setting the appropriate MTU size for a Nutanix cluster to optimize network performance. The cluster needs to support high-throughput traffic between VMs and ensure compatibility with external networks. The administrator needs to configure the virtual switches and MTU size to enable jumbo frames while ensuring that all nodes and network components are properly aligned to prevent packet loss or fragmentation. What is the first step to configure the virtual switches and MTU size in a Nutanix cluster for optimal network performance?

Options:

A.

Enable multicast filtering on the virtual switches to optimize MTU configuration.

B.

Set the MTU size to 1500 on the Nutanix virtual switches and configure a separate VLAN for MTU traffic.

C.

Set the MTU size to 1500 on all nodes and virtual switches for compatibility with external networks.

D.

Configure the MTU size to 9000 on all nodes and virtual switches, and verify that all physical network switches support jumbo frames.

Buy Now
Questions 15

When configuring an Application policy, an administrator defines a VM Category Application:MySQL as a Secured Entity. The administrator wants to ensure that traffic between VMs in the Secured Entity is kept to only required replication traffic on the default mysql service port. How should the administrator best accomplish this?

Options:

A.

Create an Inter-Tier Rule specifying the mysql service as the allowed traffic.

B.

Create an Intra-Tier Rule specifying the mysql service as the allowed traffic.

C.

Create an Inbound Rule specifying the mysql service as the allowed traffic.

D.

Create an Outbound Rule specifying the mysql service as the allowed traffic.

Buy Now
Questions 16

When cloning a Flow Network Security policy, what should be verified before enabling Enforce mode?

Options:

A.

The cloned policy's secured entities reference the intended categories.

B.

The cloned policy is configured to a different scope than the source policy.

C.

The cloned policy must first be saved before it can be enforced.

D.

The cloned policy must be renamed before it can be enforced.

Buy Now
Questions 17

Which prerequisite is required before enabling Flow Network Security Next-Gen micro segmentation?

Options:

A.

Network Controller must be enabled in Prism Central.

B.

All workloads should be on VLAN networks.

C.

A Flow license is optional and cannot be installed later.

D.

The environment must use ESXi as the hypervisor.

Buy Now
Questions 18

A service-insertion firewall VM protects user VMs access to the internet. The virtual and physical switches, as well as all user VMs, currently use the default MTU size of 1500. Everything functions normally until a user VM is migrated to another host. After the migration, the user reports that some websites fail to load while ping to those same sites still succeeds. Routing and security policies appear normal. Which two configuration changes could resolve the issue? (Choose two.)

Options:

A.

Increase the MTU across all vSwitch and physical uplinks on the relevant network path to 1558 or greater.

B.

Lower the MTU across all vSwitch and physical uplinks on the relevant network path to 1442 or lower.

C.

Decrease the MTU on the user VM's vNIC to 1442 or lower.

D.

Increase the MTU on the user VM's vNIC to 1558 or greater.

Buy Now
Questions 19

Refer to Exhibit:

NCP-NS-7.5 Question 19

An administrator is reviewing an enforced security policy "Secure 3-VM Inventory App", as shown in the exhibit. The policy's inbound rules are configured to allow traffic from specific sources to each tier of the application. The visualization shows one blocked traffic flow. Based on the information presented in the exhibit, which statement best describes this behavior?

Options:

A.

The AppTier: FrontEnd and AppTier: AppLogic entities are on different subnets.

B.

The Inventory App VM is being blocked from initiating a connection to the AppTier: Database category.

C.

The AppTier: Database category is being blocked from initiating a connection to the Inventory App VM.

D.

The security policy is blocking traffic because the Inventory App VM is using a port not allowed by the policy.

Buy Now
Questions 20

An administrator is deploying a new multi-tenant environment in Prism Central and has created a VPC named TenantVPC1. The administrator needs to enable external connectivity for this VPC so that some services inside the VPC can be accessed from the corporate network without NAT translation, while other services require Internet access through SNAT translation. The administrator plans to use an External Network(s) to provision this connectivity. Which configuration should the administrator apply to satisfy this requirement?

Options:

A.

Create two External Networks for TenantVPC1: one NAT (for Internet access) and one Routed/No-NAT (for corporate network access). Attach both to the VPC.

B.

Create two External Networks both of type Routed/No-NAT and attach both to TenantVPC1, one for corporate access and one for internet access.

C.

Create a single External Network of type NAT only and attach it to TenantVPC1. Define SNAT and Floating IPs for both the corporate-network services and internet-facing services.

D.

Create one External Network of type Routed/No-NAT only, attach to TenantVPC1, and configure routing policy to translate IP addresses for internet-facing services.

Buy Now
Questions 21

An administrator is using Flow Network Security to secure a 3-tier application and has already created and assigned the categories. The administrator does not have the details of the rules that need to be allowed to secure the application. How can the administrator use Flow Network Security to monitor the traffic and help with the policy creation without impacting the applications connectivity?

Options:

A.

Use service insertion to redirect traffic through a monitoring service to capture the application traffic and create the Flow Network Security policy based on data captured in monitoring service.

B.

Create the Policy in Save mode, review the discovered traffic, allow the required traffic flows, and move Policy to Enforce mode.

C.

Create the Policy in Monitor mode, review the discovered traffic, allow the required traffic flows, and move Policy to Enforce mode.

D.

Redirect the traffic to a Syslog server and monitor the traffic on the syslog server and then create the Flow Network Security policy based on monitored data in syslog server.

Buy Now
Questions 22

An administrator has been tasked with creating a security policy to protect specific virtual network interfaces (vNICs) within a VM in a Flow Virtual Networking setup. How can the administrator ensure that only a specific vNIC is protected by the policy?

Options:

A.

Apply the policy to the VM, and then use network segmentation to isolate the vNIC.

B.

Use subnet categorization to create a vNIC-specific policy, securing the selected vNIC based on its associated subnet.

C.

Configure an entity group with a VM and a subnet, and apply the policy to the entity group, including categories for both VM and subnet.

D.

Create a general policy for all vNICs and assign it to the VM. The system will automatically select the vNIC to protect.

Buy Now
Questions 23

An administrator needs to isolate communication between VMs in Production and Development environments. Each VM is categorized by Environment and Site category values. The administrator wants this isolation to apply only to VMs located at Site: Branch-001. Which configuration best meets the requirement?

Options:

A.

Create a Quarantine Policy between Environment:Production and Environment:Development. Scope the policy to Site: Branch-001.

B.

Create a Quarantine Policy blocking traffic between (Environment: Production + Site: Branch-001) and (Environment: Development + Site: Branch-001).

C.

Create an Isolation Policy between Environment:Production and Environment:Development. Scope the policy to Site: Branch-001.

D.

Create an Isolation Policy blocking traffic between (Environment: Production + Site: Branch-001) and (Environment: Development + Site: Branch-001).

Buy Now
Questions 24

An administrator is building a VPC... VPC CIDR: 10.10.0.0/16 Subnet CIDR: 10.10.10.0/24 "Ext_Net_Ext" (NAT): 192.168.1.0/24 "Ext_Net_Internal" (Routed): 172.16.1.0/24 The on-premises application server has an IP address of 172.16.2.50/24. A VM (10.10.10.100) in the VPC Subnet can reach the internet but cannot reach the on-premises server. Which static route needs to be added to the VPC route table to resolve this?

Options:

A.

Destination prefix: 172.16.2.0/24, Next-Hop: Ext_Net_Ext

B.

Destination Prefix: 10.10.0.0/16, Next-Hop: Ext_Net_Internal

C.

Destination prefix: 192.168.1.0/24 Next-Hop: Ext_Net_Ext

D.

Destination prefix: 172.16.2.0/24, Next-Hop: Ext_Net_Internal

Buy Now
Questions 25

While configuring third-party services (Service Insertion) in Flow Network Security Next-Gen, an administrator notices dropped packets when redirecting traffic through a network function. Which configuration change would address this issue?

Options:

A.

Reduce the MTU size to 1400 to match Geneve encapsulation.

B.

Disable Geneve tunneling on the virtual switch.

C.

Increase the MTU by an additional 58 bytes for the Geneve header.

D.

Keep the default MTU at 1500. Encapsulation is handled automatically.

Buy Now
Questions 26

An administrator observes a Network Controller Unreachable alert in Prism Central for a specific AHV cluster. All other management tasks for the cluster from Prism Central are succeeding and the cluster itself reports a healthy status. Which step is the most appropriate to investigate the cause of this specific alert?

Options:

A.

On the affected Prism Element cluster, verify that the Network Controller service is enabled and healthy on all CVMs.

B.

Verify physical network connectivity and MTU settings between Prism Central and the affected AHV hosts.

C.

Check for and restart any unhealthy Flow Virtual Networking microservices within the Prism Central scale-out architecture.

D.

Unregister and then re-register the affected cluster in Prism Central to force a full synchronization of the network controller state.

Buy Now
Questions 27

What is the additional resource requirement for each Prism Central VM when enabling Flow Virtual Networking on a Small Prism Central deployment?

Options:

A.

2 GB of memory and 1 vCPUs

B.

3 GB of memory and 2 vCPUs

C.

4 GB of memory and 3 vCPUs

D.

5 GB of memory and 4 vCPUs

Buy Now
Questions 28

A junior network operator is assigned two predefined roles in Prism Central... Role A: Prism Viewer Role B: VPC Admin The operator reports being able to successfully create, update, and delete Virtual Private Clouds (VPCs). However, the operator is unable to create a VM into the VPC. How does Prism Central determine the operator's effective permissions?

Options:

A.

The system applies the principle of "most privilege," granting the highest level of access from any assigned role.

B.

The permissions of the VPC Admin role override the more restrictive Prism Viewer role.

C.

The Prism Viewer role's permissions take precedence, preventing any write operations from the VPC Admin role.

D.

The permissions are the union of both roles, granting VPC management rights and global read-only access.

Buy Now
Questions 29

An administrator is deploying a multi-tier (web, app, database) application on a Nutanix cluster using AHV. The administrator needs to allow internal communication between tiers and provide external access to the web tier. How should the administrator satisfy this requirement?

Options:

A.

Create separate VLAN networks for each tier and configure routing on the physical network.

B.

Create a VPC with a single subnet and assign workloads of each tier to this subnet.

C.

Create separate VPCs for each tier and connect them to the same external NAT network and configure routing policies for inter-tier traffic.

D.

Create a VPC with subnets for each tier and configure the Externally Routable Prefix to include only web subnets.

Buy Now
Exam Code: NCP-NS-7.5
Exam Name: Nutanix Certified Professional - Network and Security (NCP-NS) 7.5
Last Update: Apr 16, 2026
Questions: 106

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now NCP-NS-7.5 testing engine

PDF (Q&A)

$43.57  $124.49
buy now NCP-NS-7.5 pdf