Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NCP-NS-7.5 Exam Dumps - Nutanix Certified Professional - Network and Security (NCP-NS) 7.5

Searching for workable clues to ace the Nutanix NCP-NS-7.5 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s NCP-NS-7.5 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

An administrator is configuring a Nutanix environment for Flow Network Security Next-Gen. Where should the MTU be set to ensure that Geneve encapsulation overhead is properly accounted for?

A.

On the CVM's virtual network interfaces

B.

On the AHV host's physical network interfaces

C.

On the virtual switch within Prism Central

D.

On the upstream virtual router

Full Access
Question # 10

When configuring an Application policy, an administrator defines a VM Category Application:MySQL as a Secured Entity. The administrator wants to ensure that traffic between VMs in the Secured Entity is kept to only required replication traffic on the default mysql service port. How should the administrator best accomplish this?

A.

Create an Inter-Tier Rule specifying the mysql service as the allowed traffic.

B.

Create an Intra-Tier Rule specifying the mysql service as the allowed traffic.

C.

Create an Inbound Rule specifying the mysql service as the allowed traffic.

D.

Create an Outbound Rule specifying the mysql service as the allowed traffic.

Full Access
Question # 11

An administrator creates an Isolation Policy in Prism Central to prevent communication between the Prod and Staging environments. The policy is in Enforce mode... but VMs in the two environments can still communicate. Which configuration issue most likely explains why the Isolation Policy is not blocking the traffic?

A.

The Isolation Policy does not specify any services/ports, so no traffic is matched for enforcement.

B.

Isolation Policies restrict north-south communication when associated with a VPC gateway, not east-west traffic between categories.

C.

An Application Policy allows traffic between the same categories, overriding this policy.

D.

The Prod and Staging categories have not been assigned to the VMs, so the policy does not apply.

Full Access
Question # 12

An administrator has configured a VPC and associated a NAT external network. A virtual machine connected to a subnet within this VPC is required to be accessible externally. What action must the administrator take to accomplish this?

A.

Configure a static route on the VPC's routing table.

B.

Create a Network Security Group allowing inbound traffic.

C.

Assign a Floating IP address to the virtual machine.

D.

Attach a second interface to the virtual machine.

Full Access
Question # 13

An administrator is designing a VPC for a three-tier application. The workloads must communicate with the Internet using source NAT and also communicate with on-premises networks 10.50.0.0/16 and 172.20.32.0/20 with no address translation. In the Create VPC dialog, the administrator can associate external subnets and specify destination prefixes. Which configuration satisfies the requirements?

A.

Associate a NONAT external network only; set Destination Prefixes to 0.0.0.0/0.

B.

Associate a NONAT external network for 0.0.0.0/0 and a NAT external network for 10.50.0.0/16, 172.20.32.0/20.

C.

Associate a NAT external network for 0.0.0.0/0 and a NONAT external network for 10.50.0.0/16, 172.20.32.0/20.

D.

Associate a NAT external network only; set Destination Prefixes to 0.0.0.0/0, 10.50.0.0/16, 172.20.32.0/20.

Full Access
Question # 14

When cloning a Flow Network Security policy, what should be verified before enabling Enforce mode?

A.

The cloned policy's secured entities reference the intended categories.

B.

The cloned policy is configured to a different scope than the source policy.

C.

The cloned policy must first be saved before it can be enforced.

D.

The cloned policy must be renamed before it can be enforced.

Full Access
Question # 15

After creating a BGP session in Flow Virtual Networking, the session status remains down. Which log should an administrator use first in Prism Central to troubleshoot the issue?

A.

BGP Gateway system logs from the CVM

B.

Prism Central task execution logs

C.

Routing Protocol Logs for the specific BGP session

D.

Network and Security event logs related to connectivity changes

Full Access
Question # 16

An administrator needs to use Prism Central to identify a subnet belonging to a VPC. How can the administrator identify networks associated with a VPC within Prism Central?

A.

There will be a valid IP Prefix for the subnet.

B.

The subnet will reference multiple clusters.

C.

The subnet will have a non-zero VLAN ID.

D.

The subnet will be identified as type Overlay.

Full Access
Go to page: