Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Nutanix > NCP-NS > NCP-NS-7.5

NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Question and Answers

Question # 4

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Full Access
Question # 5

Exhibit:

A VM with IP address 172.20.9.5 resides on a subnet with CIDR 172.20.9.0/24. The VPC is successfully peered via BGP with an external router... External networks outside the VPC are unable to reach the VM. What configuration change should be made to enable reachability for the VM?

A.

Modify the ERP values within the VPC to advertise a CIDR of 172.20.8.0/22

B.

Apply a PBR rule for the VM's address forwarding traffic to the IP of the No-NAT external Gateway address

C.

Apply a default route to the VPC sending all traffic to the NAT External Network

D.

Associate a NAT external network to the VPC and apply a floating IP address to the VM

Full Access
Question # 6

Which policy mode records traffic without enforcing rule actions?

A.

Enforce

B.

Monitor

C.

Isolate

D.

Save

Full Access
Question # 7

An administrator is deploying a multi-tier application on a Nutanix AHV cluster. The Web tier needs to be accessible from the internet, the App tier must communicate only with the Web tier and the Database tier, and the Database tier should accept traffic only from the App tier. The administrator must determine the correct configuration to ensure secure, reliable connectivity for the Web tier while maintaining isolation from the Internet for the App and Database tiers. Which connectivity option should the administrator implement to meet the requirements?

A.

Assign direct external IPs to all VMs in the VPC.

B.

Use overlay networks for the Web tier to provide internet access.

C.

Assign Floating IP assignments to Web tier only.

D.

Connect all tiers directly to the external network with no NAT.

Full Access
Question # 8

Refer to Exhibit:

An administrator is tasked with configuring an application policy for a two-tier public website with Web and DB components. The database servers need to communicate with each other for replication, but the web servers should not be able to communicate with each other. The administrator configures the policy... and sets it to Enforce mode. Later testing reveals that the web servers are able to communicate with each other. What should the administrator do to resolve this?

A.

Create an isolation policy for the PubSite-Prod-Web entity group.

B.

Edit the PubSite-Prod-Web entity group's intra-tier rule.

C.

Configure a VPC Network Policy to deny the traffic.

D.

Ensure the PubSite-Prod-Web servers are in different Subnets.

Full Access
Question # 9

An administrator has created a VPC with the following subnets: 10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 What action must be taken for these networks to be externally routable?

A.

Assign a No-NAT External Network & ERP 10.1.0.0/22

B.

Assign a No-NAT External Network & ERP 10.1.0.0/23

C.

Assign a NAT External Network & ERP 10.1.0.0/22

D.

Assign a NAT external network & ERP 10.1.0.0/23

Full Access
Question # 10

What must an administrator do before disabling the Network Controller?

A.

Convert external subnets into VLAN Basic networks.

B.

Delete VLAN Basic Subnets.

C.

Once enabled, the Network controller cannot be disabled.

D.

Delete all external subnets and VPCs which are in-use.

Full Access
Question # 11

A new multi-tier application is being deployed across several subnets in a Nutanix environment. The security team wants to create a Flow Network Security Policy to restrict traffic between the tiers, but the complete matrix of required network ports and protocols is not fully documented. Which strategy should the team employ first to accurately capture the necessary communication patterns without risking application outage?

A.

Create an IPFIX export of all the application traffic and monitor all traffic for 48 hours.

B.

Apply a Security policy in Monitor mode to discover all traffic between the application tiers.

C.

Create broad Security Policy to permit all TCP traffic between the tiers to ensure connectivity.

D.

Apply a Security Policy in Enforce mode adding the required flows as they appear in the flow logs.

Full Access
Question # 12

Which two options are supported as a Secured Entity in Flow Network Security Application Policies? (Choose two.)

A.

Subnet Category

B.

vNIC Category

C.

VPC Category

D.

VG Category

Full Access
Question # 13

An administrator is deploying a multi-tier (web, app, database) application on a Nutanix cluster using AHV. The administrator needs to allow internal communication between tiers and provide external access to the web tier. How should the administrator satisfy this requirement?

A.

Create separate VLAN networks for each tier and configure routing on the physical network.

B.

Create a VPC with a single subnet and assign workloads of each tier to this subnet.

C.

Create separate VPCs for each tier and connect them to the same external NAT network and configure routing policies for inter-tier traffic.

D.

Create a VPC with subnets for each tier and configure the Externally Routable Prefix to include only web subnets.

Full Access
Question # 14

A junior network operator is assigned two predefined roles in Prism Central... Role A: Prism Viewer Role B: VPC Admin The operator reports being able to successfully create, update, and delete Virtual Private Clouds (VPCs). However, the operator is unable to create a VM into the VPC. How does Prism Central determine the operator's effective permissions?

A.

The system applies the principle of "most privilege," granting the highest level of access from any assigned role.

B.

The permissions of the VPC Admin role override the more restrictive Prism Viewer role.

C.

The Prism Viewer role's permissions take precedence, preventing any write operations from the VPC Admin role.

D.

The permissions are the union of both roles, granting VPC management rights and global read-only access.

Full Access
Question # 15

An administrator has been tasked with upgrading the Nutanix cluster to a newer version of AOS. The cluster is running a mix of different versions across nodes... What is the recommended first step when upgrading a Nutanix cluster with different AOS versions across nodes?

A.

Begin by upgrading the storage and network components to the latest version before upgrading the controller VMs.

B.

Upgrade all nodes to the same version of AOS before proceeding with any other components.

C.

Upgrade the Nutanix Controller VMs first to ensure compatibility with the new AOS version.

D.

Upgrade the entire cluster at once to minimize downtime and ensure consistency.

Full Access
Question # 16

An administrator needs to configure a security policy that controls VM-to-VM communication within a category defined as secured entity. Which configuration action should the administrator take to restrict all intra-tier communication between the VMs within a category defined as secured entity?

A.

Apply the policy with inbound rules that block all inter-VM communication.

B.

Configure the security policy with allow-all intra-tier traffic.

C.

Set the security policy to allow-specific traffic for intra-tier communication.

D.

Use deny-all intra-tier traffic configuration in the policy.

Full Access
Question # 17

An administrator manages a four-node cluster Each node has a 4 available 10GB uplinks, and all four are configured as an Active/Active bundle. They want to use Flow Virtual Networking to provide networking to the VMs in the cluster with the following requirements: VMs should be in a single VPC. VMs should be reachable by their real IP addresses. The VPC should have access to the most north/south bandwidth possible. No changes can be made to the physical infrastructure. How can this best be achieved?

A.

Create a VPC with a single No-NAT External Network with three gateway nodes.

B.

Create a VPC with four No-NAT External Networks, each with a single gateway node.

C.

Create a VPC with a single No-NAT External Network with four gateway nodes.

D.

Create a VPC with a single NAT External Network with three gateway nodes.

Full Access
Question # 18

What type of policy would be used to block all traffic between VMs in the category Environment:Sandbox and VMs in the category Environment:Production?

A.

Quarantine Policy

B.

Application Policy

C.

Isolation Policy

D.

Shared Services Policy

Full Access
Question # 19

An administrator configures a VPN gateway with eBGP for dynamic route exchange. After setup, routes are not advertised to the remote peer. Which configuration is most likely missing?

A.

DHCP options for assigning IP addresses to remote endpoints.

B.

ASN configuration for the local gateway to identify its autonomous system.

C.

VLAN ID alignment between local and remote networks.

D.

Peer IP address required for establishing the BGP session.

Full Access
Question # 20

An administrator has configured a VPC with multiple overlay subnets and attached a VPN gateway using IPSec. After enabling Jumbo Frames on the physical network, VMs are still experiencing packet drops. What is the most likely reason?

A.

MTU on guest VMs exceeds recommended size for IPSec.

B.

DHCP relay is misconfigured.

C.

Jumbo frames are not supported on overlay subnets.

D.

Floating IP is missing on the VPN gateway.

Full Access
Question # 21

An administrator has deployed a microsegmentation policy in Nutanix Flow that allows certain VM traffic based on Active Directory (AD) user group membership. Users in a specific AD group report they are unable to access the VMs, while other users can connect without issues. The administrator suspects the problem is related to identity-based policy mapping. What should the administrator do to troubleshoot and resolve the access issue related to the identity-based policy?

A.

Add the IP addresses of the blocked VMs to the Inbound ruleset.

B.

Ensure the VMs are associated to the proper AD group categories.

C.

Reboot all VMs associated with the policy to refresh their security group mapping.

D.

Verify that the affected users are members of the mapped AD group.

Full Access
Question # 22

An administrator plans to upgrade a Nutanix cluster running AHV and Prism Central. The current cluster is on AOS 6.10, and the administrator wants to move to AOS 7.3 while ensuring all components remain compatible. What is the correct upgrade order to minimize downtime and maintain cluster functionality?

A.

Upgrade CVMs - > Upgrade cluster AOS - > Upgrade Prism Central - > Upgrade AHV hosts

B.

Upgrade cluster AOS - > Upgrade AHV hosts - > Upgrade Prism Central - > Upgrade CVMs

C.

Upgrade Prism Central - > Upgrade AHV hosts - > Upgrade CVMs - > Upgrade cluster AOS

D.

Upgrade AHV hosts - > Upgrade cluster AOS - > Upgrade Prism Central - > Upgrade CVMs

Full Access
Question # 23

An administrator creates a VPC named AppVPC1 in Nutanix Cloud Infrastructure (NCI) with separate subnets for the web, app, and database tiers. The database subnet must remain isolated from external networks; however, all tiers need to communicate with each other internally. What should the administrator configure to limit external access to only the web and app subnets?

A.

Enable NAT Gateway on the database subnet for outbound communication.

B.

Configure a routing policy in the VPC to deny external traffic to and from the database subnet.

C.

Attach the web and app subnets to the external network through an AHV managed bridge.

D.

Create Static Routes on the physical network to interconnect the VPC subnets.

Full Access
Question # 24

An administrator is setting up a transit VPC to connect two VPCs and enable both internal (on-prem) and Internet connectivity. Which is the best configuration to meet the requirement?

A.

Configure the transit VPC with two NAT External Subnets to support redundancy for internet connectivity.

B.

Configure the transit VPC with one NAT External Subnet and one No-NAT External Subnet, each serving different traffic types.

C.

Configure the transit VPC with two No-NAT Overlay External Subnets for both Internet and on-prem traffic.

D.

Configure the transit VPC with a single No-NAT External Subnet to handle both internal and internet traffic.

Full Access
Question # 25

A VPC admin creates a policy to allow traffic between two IP subnets but forgets to enable reverse direction. What happens in this scenario?

A.

Traffic is blocked completely because the policy is invalid.

B.

Policy is rejected by Prism Central during validation.

C.

Traffic flows bidirectionally because policies are stateful by default.

D.

Traffic flows only in one direction, blocking return traffic.

Full Access
Question # 26

An administrator wants to configure the subnet 10.1.1.0/24 to stretch across two VPCs over a Network Gateway in VXLAN mode. The VMs on this subnet need to communicate with a traffic pattern of size 2000 Bytes. What is the minimum MTU required in the underlay network to ensure communication happens without fragmentation or traffic drops?

A.

2058 Bytes

B.

2108 Bytes

C.

2116 Bytes

D.

9216 Bytes

Full Access
Question # 27

An administrator is responsible for managing user access to a Nutanix cluster... configure custom user roles... What is the first step in configuring and managing user roles for a Nutanix cluster?

A.

Create the requisite Authorization Polices from custom or built-in roles.

B.

Modify the administrator role to restrict access to critical system functions.

C.

Disable default roles and create new roles for each team.

D.

Create the requisite Custom Roles from custom or built-in Authorization Polices.

Full Access
Question # 28

An administrator finds that App tier VMs cannot connect to the Database tier on port 3306, and Flow logs show the traffic is being denied by a security policy. The Web tier communicates normally. What should the administrator do to allow the App tier to access the Database tier?

A.

Update the microsegmentation policy in Nutanix Flow to allow App - > Database traffic on port 3306.

B.

Delete all existing Flow policies and recreate them from scratch.

C.

Enable NAT for the Database tier to allow connections from the App tier.

D.

Change the Database tier subnet to match the App tier subnet.

Full Access
Question # 29

What is the first step in preparing a Nutanix cluster for Flow Virtual Networking?

A.

Enable the Network Controller in Prism Central.

B.

Install the latest version of Acropolis OS (AOS) on all nodes.

C.

Install the Nutanix Flow Controller on all cluster nodes.

D.

Configure the VLANs on the physical network switches.

Full Access
Question # 30

An administrator needs to make a web server VM, which is inside a private VPC overlay subnet, accessible from the external network. The administrator assigns a Floating IP to the VM, but the service is still unreachable from the outside. What is a likely reason for this failure?

A.

A Floating IP was assigned from a different external subnet than the one used by the VPC.

B.

The VPC has no default route configured to use the external subnet.

C.

The VM was not rebooted after the Floating IP was assigned.

D.

The web server VM is not running the latest version of NGT.

Full Access
Question # 31

An administrator has a requirement to capture application flow data for a policy in Monitor mode and export those events to an external SIEM for correlation with other logs. Which two actions are required to achieve this? (Choose two.)

A.

Enable IPFIX export on the monitored policy.

B.

Enable Policy Hit Logging on the monitored policy.

C.

Create a Flow Audit Policy on the monitored policy.

D.

Configure a remote syslog destination in Prism Central.

Full Access