Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

NCP-NS-7.5 Practice Questions

Nutanix Certified Professional - Network and Security (NCP-NS) 7.5

Last Update 2 days ago
Total Questions : 106

Dive into our fully updated and stable NCP-NS-7.5 practice test platform, featuring all the latest NCP-NS exam questions added this week. Our preparation tool is more than just a Nutanix study aid; it's a strategic advantage.

Our free NCP-NS practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about NCP-NS-7.5. Use this test to pinpoint which areas you need to focus your study on.

NCP-NS-7.5 PDF

NCP-NS-7.5 PDF (Printable)
$43.75
$124.99

NCP-NS-7.5 Testing Engine

NCP-NS-7.5 PDF (Printable)
$50.75
$144.99

NCP-NS-7.5 PDF + Testing Engine

NCP-NS-7.5 PDF (Printable)
$63.7
$181.99
Question # 21

An administrator has observed the following message: Which two statements most accurately describe the security hitlog captured above? (Choose two.)

Options:

A.  

This is a security hit log on the rule name "Production-External-WebTier".

B.  

The source ip address is 10.38.174.5 and source port is TCP/123.

C.  

86.108.190.23 is sending a packet on UDP 123.

D.  

10.38.174.57 is sending a packet destined to UDP 123.

Discussion 0
Question # 22

A VDI policy in Flow Network Security allows access to specific resources only when users from the Admins Active Directory group log into a VM. Some administrators report that when they log in to certain VMs, access is blocked (default deny applies), while the same user accounts work correctly when logged on to other VMs. When checking the VM details in Prism Central, operations observes that the expected dynamic category based on the logged-in AD user is not assigned on the affected VMs. What is the most likely reason for this behavior?

Options:

A.  

The Admins group contains nested AD groups, and only the top-level group is synchronized by Prism Central.

B.  

The Prism Central Active Directory service connection is misconfigured or has failed.

C.  

The affected VMs allowed login using cached credentials without contacting the Domain Controller.

D.  

The security policy is in Monitor mode, so the dynamic category assignment is not applied.

Discussion 0
Question # 23

Before creating a new Application Security Policy in Prism Central, what prerequisite must exist?

Options:

A.  

A category key/value pair must be defined for use in the policy.

B.  

Flow Network Security must be enabled on all registered clusters.

C.  

Targeted VMs must have category assignments.

D.  

The Network Controller must be deployed on each cluster in the policy's scope.

Discussion 0
Question # 24

An administrator has a VPC with multiple overlay subnets and a VPN gateway configured for site-to-site connectivity. During testing, the administrator noticed fragmented packets and poor performance. Which configuration change resolves this issue without disabling VPN?

Options:

A.  

Increase MTU to 1500 on guest VMs

B.  

Enable jumbo frames on VLAN subnets

C.  

Reduce MTU to 1356 on guest VMs

D.  

Disable Geneve encapsulation

Discussion 0
Question # 25

What must an administrator do before disabling the Network Controller?

Options:

A.  

Convert external subnets into VLAN Basic networks.

B.  

Delete VLAN Basic Subnets.

C.  

Once enabled, the Network controller cannot be disabled.

D.  

Delete all external subnets and VPCs which are in-use.

Discussion 0
Question # 26

An administrator plans to upgrade the Network Controller in a Flow Virtual Networking deployment. The environment includes multiple AHV clusters managed by Prism Central. Which prerequisite must be verified before upgrading the Network Controller?

Options:

A.  

Flow Network Security must be upgraded to the target release before upgrading the Network Controller.

B.  

Each cluster must be running the Flow Network Security version specified as compatible with the target Network Controller release.

C.  

Each cluster must be running AHV versions compatible with the target Network Controller release.

D.  

Network Controller Prism Element upgrades must be applied before before Network Controller Prism Central upgrades can be applied.

Discussion 0
Question # 27

When configuring an Application policy, an administrator defines a VM Category Application:MySQL as a Secured Entity. The administrator wants to ensure that traffic between VMs in the Secured Entity is kept to only required replication traffic on the default mysql service port. How should the administrator best accomplish this?

Options:

A.  

Create an Inter-Tier Rule specifying the mysql service as the allowed traffic.

B.  

Create an Intra-Tier Rule specifying the mysql service as the allowed traffic.

C.  

Create an Inbound Rule specifying the mysql service as the allowed traffic.

D.  

Create an Outbound Rule specifying the mysql service as the allowed traffic.

Discussion 0
Question # 28

Refer to Exhibit:

Question # 28

An organization uses an FNS-NG Service Chain to steer application traffic through a pair of third-party firewall Network Function VMs operating in Active/Standby mode. Users suddenly report that all application access is blocked. The administrator reviews Prism Central - > Network & Security - > Network Functions, where the summary shown in the exhibit is displayed. Additional information: Alert: "Network Function 'PANW Service Insertion' virtual NIC pair(s) are unhealthy." Both firewall VMs are powered on and reachable. The security policy using the service chain has not been changed. Based on the exhibit and findings, what is the most likely cause of the traffic outage?

Options:

A.  

The service-chain health check failed to reroute sessions to the healthy firewall.

B.  

One of the Network Function vNIC pairs lost dataplane connectivity, interrupting traffic until health is stabilized.

C.  

Firewall policy synchronization was not configured when the standby firewall became active.

D.  

The inbound vNIC on SE-PA-VM Firewall-2 failed, preventing redirected packets from reaching the firewall.

Discussion 0
Question # 29

An administrator has created a VPC with the following subnets: 10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 What action must be taken for these networks to be externally routable?

Options:

A.  

Assign a No-NAT External Network & ERP 10.1.0.0/22

B.  

Assign a No-NAT External Network & ERP 10.1.0.0/23

C.  

Assign a NAT External Network & ERP 10.1.0.0/22

D.  

Assign a NAT external network & ERP 10.1.0.0/23

Discussion 0
Question # 30

In Nutanix Flow, which action transitions a security policy from observing traffic to actively enforcing the rules?

Options:

A.  

Disable Traffic Visualization for the policy.

B.  

Enforce policy by setting its scope.

C.  

Change policy mode from Monitor to Save.

D.  

Change policy mode from Monitor to Enforce.

Discussion 0
Get NCP-NS-7.5 dumps and pass your exam in 24 hours!

Free Exams Sample Questions