Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Questions and Answers

Questions 4

An administrator creates a new VPC in No NAT mode to allow VMs in a web tier to reach an external firewall. After deployment... none of the VMs can reach external IP addresses... Which action should the administrator take to restore routed north-south connectivity from the VPC?

Options:

A.

Configure a Flow Security Policy to allow egress traffic from the VPC subnet.

B.

Create an Externally Routable Prefix (ERP) entry for the overlay subnet in the VPC.

C.

Change the VPC mode to NAT so that outbound traffic is automatically translated.

D.

Add a default static route in each VM pointing to the external firewall's IP address.

Buy Now
Questions 5

An administrator is deploying a multi-tier (web, app, database) application on a Nutanix cluster using AHV. The administrator needs to allow internal communication between tiers and provide external access to the web tier. How should the administrator satisfy this requirement?

Options:

A.

Create separate VLAN networks for each tier and configure routing on the physical network.

B.

Create a VPC with a single subnet and assign workloads of each tier to this subnet.

C.

Create separate VPCs for each tier and connect them to the same external NAT network and configure routing policies for inter-tier traffic.

D.

Create a VPC with subnets for each tier and configure the Externally Routable Prefix to include only web subnets.

Buy Now
Questions 6

Which step is required to prepare an AHV cluster for Flow Network Security Next-Gen?

Options:

A.

Enable microsegmentation and network controller on the cluster.

B.

Assign static IP addresses to all VMs before enabling Flow.

C.

Enable microsegmentation policies on all VM groups before enabling Flow.

D.

Disable all existing VLANs in the cluster to allow Flow to control traffic.

Buy Now
Questions 7

An administrator has deployed a VPC for a multi-tier application on Nutanix AHV. The Web tier requires public internet access, while the App and Database tiers must remain private and isolated. Which steps should the administrator take to configure the external network correctly?

Options:

A.

Use overlay networks for external access instead of configuring a VPC external network.

B.

Assign external IPs to all VMs in the VPC to simplify connectivity.

C.

Configure an external network for the Web tier subnet and leave App and Database tiers private.

D.

Attach a single external network to the VPC and allow all tiers unrestricted internet access.

Buy Now
Questions 8

An administrator plans to upgrade the Network Controller in a Flow Virtual Networking deployment. The environment includes multiple AHV clusters managed by Prism Central. Which prerequisite must be verified before upgrading the Network Controller?

Options:

A.

Flow Network Security must be upgraded to the target release before upgrading the Network Controller.

B.

Each cluster must be running the Flow Network Security version specified as compatible with the target Network Controller release.

C.

Each cluster must be running AHV versions compatible with the target Network Controller release.

D.

Network Controller Prism Element upgrades must be applied before before Network Controller Prism Central upgrades can be applied.

Buy Now
Questions 9

An administrator has a requirement to capture application flow data for a policy in Monitor mode and export those events to an external SIEM for correlation with other logs. Which two actions are required to achieve this? (Choose two.)

Options:

A.

Enable IPFIX export on the monitored policy.

B.

Enable Policy Hit Logging on the monitored policy.

C.

Create a Flow Audit Policy on the monitored policy.

D.

Configure a remote syslog destination in Prism Central.

Buy Now
Questions 10

Exhibit:

An administrator has just added a new VPC for Tenant-B... However, users are reporting that they are unable to access external resources from VMs created in the Tenant-B-Prod subnet. What should be done to correct the problem?

Options:

A.

Update the ERPs for Tenant-B-VPC.

B.

Add a Network Policy in Tenant-B-VPC.

C.

Add a Network Policy in Transit-VPC.

D.

Update the ERPs for Transit-VPC.

Buy Now
Questions 11

An administrator manages a four-node cluster Each node has a 4 available 10GB uplinks, and all four are configured as an Active/Active bundle. They want to use Flow Virtual Networking to provide networking to the VMs in the cluster with the following requirements: VMs should be in a single VPC. VMs should be reachable by their real IP addresses. The VPC should have access to the most north/south bandwidth possible. No changes can be made to the physical infrastructure. How can this best be achieved?

Options:

A.

Create a VPC with a single No-NAT External Network with three gateway nodes.

B.

Create a VPC with four No-NAT External Networks, each with a single gateway node.

C.

Create a VPC with a single No-NAT External Network with four gateway nodes.

D.

Create a VPC with a single NAT External Network with three gateway nodes.

Buy Now
Questions 12

An administrator uses Nutanix Flow to secure a three-tier application (Web, App, and Database tiers). After observing the traffic, they find that: The Web tier communicates with the App tier over HTTP (port 80) The App tier communicates with the Database tier over TCP port 1433 The Database tier does not initiate connections The Web tier receives inbound HTTP traffic from the corporate DMZ on port 8080 No other traffic should be allowed What should the administrator do to document and then securely apply these flows in Nutanix Flow?

Options:

A.

Use Flow Network Visualization to capture observed flows and convert them into microsegmentation security policies.

B.

Add all VMs to a single security policy to simplify communication.

C.

Disable traffic-flow discovery and configure all policies manually.

D.

Manually create isolation policies between all VMs in the environment.

Buy Now
Questions 13

An administrator needs to delegate the management of security policies to a dedicated SecOps team. To enforce the principle of least privilege, the administrator assigns the predefined Flow Policy Author role to a user on the team. The user confirms they can create, monitor, and enforce security policies. However, when attempting to build a new application security policy for a set of newly deployed VMs, the user reports they are unable to create a new category to group these VMs. The option is not available in the Prism Central UI. Which statement explains this behavior?

Options:

A.

The Flow Policy Author role must be cloned into a custom role before it can be used.

B.

The user's role must be assigned with a scope for the specific projects they manage.

C.

The user is missing the Flow Admin role, which is required for category management.

D.

The Flow Policy Author role can only apply policies to existing categories by design.

Buy Now
Questions 14

Which two statements are true with respect to Flow Network Security Policies? (Choose two.)

Options:

A.

Flow Network Security is a stateful firewall.

B.

Flow Network Security supports L3 and L4-based firewall rules.

C.

Flow Network Security supports L7-based firewall rules.

D.

Flow Network Security supports rules based on L2 MAC Addresses.

Buy Now
Questions 15

A new multi-tier application is being deployed across several subnets in a Nutanix environment. The security team wants to create a Flow Network Security Policy to restrict traffic between the tiers, but the complete matrix of required network ports and protocols is not fully documented. Which strategy should the team employ first to accurately capture the necessary communication patterns without risking application outage?

Options:

A.

Create an IPFIX export of all the application traffic and monitor all traffic for 48 hours.

B.

Apply a Security policy in Monitor mode to discover all traffic between the application tiers.

C.

Create broad Security Policy to permit all TCP traffic between the tiers to ensure connectivity.

D.

Apply a Security Policy in Enforce mode adding the required flows as they appear in the flow logs.

Buy Now
Questions 16

An administrator has two user VPCs connected via a Transit VPC. Routing works for most subnets, but one overlay subnet cannot reach external networks. What is the most probable cause?

Options:

A.

Incorrect ASN in the BGP configuration in the Transit VPC

B.

Mismatch in ERP configuration in user and Transit VPC

C.

Floating IP not assigned to the gateway

D.

DHCP configuration is disabled on the overlay subnet in the user VPC

Buy Now
Questions 17

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

Options:

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Buy Now
Questions 18

An administrator configures a VPN gateway with eBGP for dynamic route exchange. After setup, routes are not advertised to the remote peer. Which configuration is most likely missing?

Options:

A.

DHCP options for assigning IP addresses to remote endpoints.

B.

ASN configuration for the local gateway to identify its autonomous system.

C.

VLAN ID alignment between local and remote networks.

D.

Peer IP address required for establishing the BGP session.

Buy Now
Questions 19

When creating a VPC, enabling the Transit VPC toggle changes the role of the VPC. What does the Transit VPC toggle do?

Options:

A.

Forces NAT for all external subnets

B.

Creates a hub-and-spoke VPC for routing

C.

Converts all Overlay subnets into VLAN subnets

D.

Enables DHCP relay for routed subnets

Buy Now
Questions 20

Refer to Exhibit:

In the AD-VDI Departmental SecPol policy shown in the exhibit, ADGroup: Engineering is configured as a secured entity in a VDI Security Policy. Prism Central shows 2 / 2 active sessions under this group, but the administrator confirms that three Engineering users are currently logged in to persistent VDI desktops. The third user's VM shows no ADGroup assignment in its VM details in Prism Central, even after the user has successfully logged in. All three users are members of the same AD group, and the Domain Controller event logs confirm a successful interactive login for the third user. Which condition explains why the third user's VM is not being assigned the ADGroup: Engineering category?

Options:

A.

The Active Directory Service account used by Prism Central is locked.

B.

The third user's VM has been assigned an AppType category, preventing ID-Based categorization.

C.

The Flow Identity Service has been disabled in Prism Central for the VM the third user is logging in to.

D.

The Flow Network Security policy scope does not include the VLAN where the third user's VM resides.

Buy Now
Questions 21

Refer to Exhibit:

How should an Application Policy be created whose rules apply only to vNIC1 of VM1?

Options:

A.

Create an Entity Group with Cat:SubnetA and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

B.

Add Cat:SubnetA as secured entity in the Application Policy.

C.

Create an Entity Group with Cat:SubnetA, Cat:SubnetB and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

D.

Add Cat:SubnetA and Cat:VM1 as secured entity in the Application Policy.

Buy Now
Questions 22

What entity is automatically created on the cluster hosting Prism Central when Microsegmentation is enabled?

Options:

A.

A storage container named flow_data is created.

B.

A Bucket named flow_data is created.

C.

A File Share named flow_data is created.

D.

A virtual machine named flow_data is created.

Buy Now
Questions 23

Which policy type takes highest precedence in Enforce mode?

Options:

A.

Application

B.

Isolation

C.

Quarantine

D.

Shared Service

Buy Now
Questions 24

An administrator has a VPC with multiple overlay subnets and a VPN gateway configured for site-to-site connectivity. During testing, the administrator noticed fragmented packets and poor performance. Which configuration change resolves this issue without disabling VPN?

Options:

A.

Increase MTU to 1500 on guest VMs

B.

Enable jumbo frames on VLAN subnets

C.

Reduce MTU to 1356 on guest VMs

D.

Disable Geneve encapsulation

Buy Now
Questions 25

In a Nutanix deployment, when is the Network Controller automatically enabled?

Options:

A.

When the Small Prism Central deployment is scaled out to three PCVM's

B.

When the Network Controller is manually configured from the Prism Central settings page

C.

When the Network Controller is enabled on a Hyper-V cluster

D.

When the X-Large Prism Central deployment is installed or upgraded

Buy Now
Questions 26

An administrator needs to use Prism Central to identify a subnet belonging to a VPC. How can the administrator identify networks associated with a VPC within Prism Central?

Options:

A.

There will be a valid IP Prefix for the subnet.

B.

The subnet will reference multiple clusters.

C.

The subnet will have a non-zero VLAN ID.

D.

The subnet will be identified as type Overlay.

Buy Now
Questions 27

An administrator has a VPC with a single active gateway node that successfully peers with an external router using a single BGP GW and session. To eliminate a single point of failure, the administrator deploys a second BGP gateway to the VPC. After the second gateway is added and shows a healthy state, the external router still only sees a single BGP session. What is the most likely reason for the second session not being established on the external router?

Options:

A.

The BGP Hold-down timer on the external router is set too high.

B.

Network Security Groups are blocking BGP traffic from the second gateway's IP address.

C.

The external router needs BGP peering configuration pointing to the IP address of the first gateway node.

D.

The second BGP gateway requires a BGP session configured to peer with the external router.

Buy Now
Questions 28

Which statement best describes the function of an External Network in Flow Virtual Networking?

Options:

A.

It acts as the entry and exit point for traffic to and from a VPC.

B.

It enables communication between subnets within a VPC.

C.

It enables communication between VPCs.

D.

Each VPC requires a dedicated External Network that cannot be shared.

Buy Now
Questions 29

An organization plans to apply security controls based on user group membership in Active Directory. What configuration is required in Prism Central before VDI policies can be used?

Options:

A.

Map category assignments to roles using RBAC settings.

B.

Create the list of users and assign categories to them.

C.

Assign categories to identities in the Admin Center.

D.

Configure category values mapped to AD groups.

Buy Now
Questions 30

During a security review, the administrator confirms that the existing security policy does not explicitly allow traffic from Environment: Development to Environment: Production. A VM in the Development category was still able to reach a Production VM over IPv6. What is the most likely cause of this behavior?

Options:

A.

An isolation policy was incorrectly applied instead of an application policy.

B.

The Allow All IPv6 option in the policy was selected.

C.

The policy was misconfigured and allowed all Layer 2 broadcast traffic.

D.

The VM was using a static IPv6 address.

Buy Now
Questions 31

An administrator has been tasked with upgrading the Nutanix cluster to a newer version of AOS. The cluster is running a mix of different versions across nodes... What is the recommended first step when upgrading a Nutanix cluster with different AOS versions across nodes?

Options:

A.

Begin by upgrading the storage and network components to the latest version before upgrading the controller VMs.

B.

Upgrade all nodes to the same version of AOS before proceeding with any other components.

C.

Upgrade the Nutanix Controller VMs first to ensure compatibility with the new AOS version.

D.

Upgrade the entire cluster at once to minimize downtime and ensure consistency.

Buy Now
Exam Code: NCP-NS-7.5
Exam Name: Nutanix Certified Professional - Network and Security (NCP-NS) 7.5
Last Update: Apr 25, 2026
Questions: 106
NCP-NS-7.5 pdf

NCP-NS-7.5 PDF

$25.5  $84.99
NCP-NS-7.5 Engine

NCP-NS-7.5 Testing Engine

$30  $99.99
NCP-NS-7.5 PDF + Engine

NCP-NS-7.5 PDF + Testing Engine

$40.5  $134.99