Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NCP-NS-7.5 Exam Dumps - Nutanix Certified Professional - Network and Security (NCP-NS) 7.5

Searching for workable clues to ace the Nutanix NCP-NS-7.5 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s NCP-NS-7.5 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

An administrator needs to delegate the management of security policies to a dedicated SecOps team. To enforce the principle of least privilege, the administrator assigns the predefined Flow Policy Author role to a user on the team. The user confirms they can create, monitor, and enforce security policies. However, when attempting to build a new application security policy for a set of newly deployed VMs, the user reports they are unable to create a new category to group these VMs. The option is not available in the Prism Central UI. Which statement explains this behavior?

A.

The Flow Policy Author role must be cloned into a custom role before it can be used.

B.

The user's role must be assigned with a scope for the specific projects they manage.

C.

The user is missing the Flow Admin role, which is required for category management.

D.

The Flow Policy Author role can only apply policies to existing categories by design.

Full Access
Question # 5

An administrator has been tasked with configuring virtual switches and setting the appropriate MTU size for a Nutanix cluster to optimize network performance. The cluster needs to support high-throughput traffic between VMs and ensure compatibility with external networks. The administrator needs to configure the virtual switches and MTU size to enable jumbo frames while ensuring that all nodes and network components are properly aligned to prevent packet loss or fragmentation. What is the first step to configure the virtual switches and MTU size in a Nutanix cluster for optimal network performance?

A.

Enable multicast filtering on the virtual switches to optimize MTU configuration.

B.

Set the MTU size to 1500 on the Nutanix virtual switches and configure a separate VLAN for MTU traffic.

C.

Set the MTU size to 1500 on all nodes and virtual switches for compatibility with external networks.

D.

Configure the MTU size to 9000 on all nodes and virtual switches, and verify that all physical network switches support jumbo frames.

Full Access
Question # 6

Which policy is used to isolate a compromised VM in the most efficient way possible?

A.

Isolation Policy

B.

Quarantine Policy

C.

Shared Service Policy

D.

Application Policy

Full Access
Question # 7

An enterprise has deployed a VPC called FinanceVPC using Nutanix Flow Virtual Networking. The Finance team needs the following connectivity: Internal servers in the VPC must reach an on-premises corporate data-center via a point-to-point encrypted link. Some servers in the VPC must also access the public internet with source NAT and receive inbound access via floating IPs. The corporate network uses overlapping IP space with other VPCs in the environment, so address translation is necessary for those workloads. The networking design must support routing via BGP for future site expansions and provide low-latency north-south connectivity. Which actions should the administrator take to satisfy this requirement?

A.

Use two No-NAT External Networks—one for the on-prem link and one for Internet access; configure static routes for both without NAT.

B.

Use a single No-NAT External Network for both on-prem and Internet access; configure BGP and direct routing out to the internet without NAT.

C.

Use a No-NAT External Network for the on-premises link and a NAT External Network for Internet access. Configure a VPN tunnel to the on-premises location and enable BGP on the VPC router for the on-premises link.

D.

Use a single NAT External Network for both the on-prem link and Internet access; configure a default route to the external network and enable SNAT and floating IPs for all traffic.

Full Access
Question # 8

Which two statements are true with respect to Flow Network Security Policies? (Choose two.)

A.

Flow Network Security is a stateful firewall.

B.

Flow Network Security supports L3 and L4-based firewall rules.

C.

Flow Network Security supports L7-based firewall rules.

D.

Flow Network Security supports rules based on L2 MAC Addresses.

Full Access
Go to page: