Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NCP-NS-7.5 Questions and Answers

Question # 6

Which statement accurately describes the behavior of a Flow Network Security policy operating in Monitor mode?

A.

All matching traffic is discovered and denied, but not allowed.

B.

Traffic is blocked unless it matches an "allow" rule in Enforce mode.

C.

Only East-West traffic is discovered, but North-South traffic is not.

D.

All matching traffic is discovered and allowed, but not blocked.

Full Access
Question # 7

An administrator uses Nutanix Flow to secure a three-tier application (Web, App, and Database tiers). After observing the traffic, they find that: The Web tier communicates with the App tier over HTTP (port 80) The App tier communicates with the Database tier over TCP port 1433 The Database tier does not initiate connections The Web tier receives inbound HTTP traffic from the corporate DMZ on port 8080 No other traffic should be allowed What should the administrator do to document and then securely apply these flows in Nutanix Flow?

A.

Use Flow Network Visualization to capture observed flows and convert them into microsegmentation security policies.

B.

Add all VMs to a single security policy to simplify communication.

C.

Disable traffic-flow discovery and configure all policies manually.

D.

Manually create isolation policies between all VMs in the environment.

Full Access
Question # 8

In a Nutanix deployment, when is the Network Controller automatically enabled?

A.

When the Small Prism Central deployment is scaled out to three PCVM's

B.

When the Network Controller is manually configured from the Prism Central settings page

C.

When the Network Controller is enabled on a Hyper-V cluster

D.

When the X-Large Prism Central deployment is installed or upgraded

Full Access
Question # 9

An administrator has a VPC with a single active gateway node that successfully peers with an external router using a single BGP GW and session. To eliminate a single point of failure, the administrator deploys a second BGP gateway to the VPC. After the second gateway is added and shows a healthy state, the external router still only sees a single BGP session. What is the most likely reason for the second session not being established on the external router?

A.

The BGP Hold-down timer on the external router is set too high.

B.

Network Security Groups are blocking BGP traffic from the second gateway's IP address.

C.

The external router needs BGP peering configuration pointing to the IP address of the first gateway node.

D.

The second BGP gateway requires a BGP session configured to peer with the external router.

Full Access
Question # 10

An administrator has configured a VPC and associated a NAT external network. A virtual machine connected to a subnet within this VPC is required to be accessible externally. What action must the administrator take to accomplish this?

A.

Configure a static route on the VPC's routing table.

B.

Create a Network Security Group allowing inbound traffic.

C.

Assign a Floating IP address to the virtual machine.

D.

Attach a second interface to the virtual machine.

Full Access
Question # 11

A VPC admin creates a policy to allow traffic between two IP subnets but forgets to enable reverse direction. What happens in this scenario?

A.

Traffic is blocked completely because the policy is invalid.

B.

Policy is rejected by Prism Central during validation.

C.

Traffic flows bidirectionally because policies are stateful by default.

D.

Traffic flows only in one direction, blocking return traffic.

Full Access
Question # 12

An administrator creates an Isolation Policy in Prism Central to prevent communication between the Prod and Staging environments. The policy is in Enforce mode... but VMs in the two environments can still communicate. Which configuration issue most likely explains why the Isolation Policy is not blocking the traffic?

A.

The Isolation Policy does not specify any services/ports, so no traffic is matched for enforcement.

B.

Isolation Policies restrict north-south communication when associated with a VPC gateway, not east-west traffic between categories.

C.

An Application Policy allows traffic between the same categories, overriding this policy.

D.

The Prod and Staging categories have not been assigned to the VMs, so the policy does not apply.

Full Access
Question # 13

A customer wants to extend a VLAN subnet to a remote data center using VTEP. The administrator configures a Subnet Extension which shows UP in the Prism Interface, yet traffic fails to pass. Which setting is most likely misconfigured?

A.

Route Policy for VTEP has not been configured.

B.

VLAN ID does not match in the remote data center.

C.

Remote gateway IP address has not been configured.

D.

VXLAN UDP port is set to 4789.

Full Access
Question # 14

An administrator needs to ensure all web traffic (HTTP/HTTPS) from a specific subnet (10.100.20.0/24) is redirected through a third-party virtual firewall inside the VPC for Layer 7 inspection before reaching the internet. The firewall VM has an IP of 10.100.30.5 and is connected to a different subnet. What should be done to enforce this specific traffic path?

A.

Configure a Policy-Based Route (PBR) on the VPC with a re-route IP 10.100.30.5.

B.

Create a FNS policy with an allow rule for the FW IP 10.100.30.5.

C.

Move the Firewall VM into the same subnet and set the default GW of the web servers to 10.100.30.5.

D.

Create a Network Policy with a high priority with the source 10.100.20.0/24, destination of 10.100.30.5 on port 80 & 443.

Full Access
Question # 15

An administrator plans to upgrade the Network Controller in a Flow Virtual Networking deployment. The environment includes multiple AHV clusters managed by Prism Central. Which prerequisite must be verified before upgrading the Network Controller?

A.

Flow Network Security must be upgraded to the target release before upgrading the Network Controller.

B.

Each cluster must be running the Flow Network Security version specified as compatible with the target Network Controller release.

C.

Each cluster must be running AHV versions compatible with the target Network Controller release.

D.

Network Controller Prism Element upgrades must be applied before before Network Controller Prism Central upgrades can be applied.

Full Access
Question # 16

A new multi-tier application is being deployed across several subnets in a Nutanix environment. The security team wants to create a Flow Network Security Policy to restrict traffic between the tiers, but the complete matrix of required network ports and protocols is not fully documented. Which strategy should the team employ first to accurately capture the necessary communication patterns without risking application outage?

A.

Create an IPFIX export of all the application traffic and monitor all traffic for 48 hours.

B.

Apply a Security policy in Monitor mode to discover all traffic between the application tiers.

C.

Create broad Security Policy to permit all TCP traffic between the tiers to ensure connectivity.

D.

Apply a Security Policy in Enforce mode adding the required flows as they appear in the flow logs.

Full Access
Question # 17

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Full Access
Question # 18

An administrator needs to make a web server VM, which is inside a private VPC overlay subnet, accessible from the external network. The administrator assigns a Floating IP to the VM, but the service is still unreachable from the outside. What is a likely reason for this failure?

A.

A Floating IP was assigned from a different external subnet than the one used by the VPC.

B.

The VPC has no default route configured to use the external subnet.

C.

The VM was not rebooted after the Floating IP was assigned.

D.

The web server VM is not running the latest version of NGT.

Full Access
Question # 19

Which step is required before placing the Flow Network Security software bundle on a local web server?

A.

Perform an inventory on the Nutanix cluster before transferring any bundle files to the web server.

B.

Extract the downloaded bundle using 7zip and upload it directly to Prism Central.

C.

Enable Direct Upload in Life Cycle Manager so the bundles can be transferred automatically to the Nutanix cluster.

D.

Set up a local web server and download both the required software LCM bundle and compatibility bundle.

Full Access
Question # 20

An administrator has deployed a microsegmentation policy in Nutanix Flow that allows certain VM traffic based on Active Directory (AD) user group membership. Users in a specific AD group report they are unable to access the VMs, while other users can connect without issues. The administrator suspects the problem is related to identity-based policy mapping. What should the administrator do to troubleshoot and resolve the access issue related to the identity-based policy?

A.

Add the IP addresses of the blocked VMs to the Inbound ruleset.

B.

Ensure the VMs are associated to the proper AD group categories.

C.

Reboot all VMs associated with the policy to refresh their security group mapping.

D.

Verify that the affected users are members of the mapped AD group.

Full Access
Question # 21

An administrator has a VPC with multiple overlay subnets and a VPN gateway configured for site-to-site connectivity. During testing, the administrator noticed fragmented packets and poor performance. Which configuration change resolves this issue without disabling VPN?

A.

Increase MTU to 1500 on guest VMs

B.

Enable jumbo frames on VLAN subnets

C.

Reduce MTU to 1356 on guest VMs

D.

Disable Geneve encapsulation

Full Access
Question # 22

A junior network operator is assigned two predefined roles in Prism Central... Role A: Prism Viewer Role B: VPC Admin The operator reports being able to successfully create, update, and delete Virtual Private Clouds (VPCs). However, the operator is unable to create a VM into the VPC. How does Prism Central determine the operator's effective permissions?

A.

The system applies the principle of "most privilege," granting the highest level of access from any assigned role.

B.

The permissions of the VPC Admin role override the more restrictive Prism Viewer role.

C.

The Prism Viewer role's permissions take precedence, preventing any write operations from the VPC Admin role.

D.

The permissions are the union of both roles, granting VPC management rights and global read-only access.

Full Access
Question # 23

An administrator observes a Network Controller Unreachable alert in Prism Central for a specific AHV cluster. All other management tasks for the cluster from Prism Central are succeeding and the cluster itself reports a healthy status. Which step is the most appropriate to investigate the cause of this specific alert?

A.

On the affected Prism Element cluster, verify that the Network Controller service is enabled and healthy on all CVMs.

B.

Verify physical network connectivity and MTU settings between Prism Central and the affected AHV hosts.

C.

Check for and restart any unhealthy Flow Virtual Networking microservices within the Prism Central scale-out architecture.

D.

Unregister and then re-register the affected cluster in Prism Central to force a full synchronization of the network controller state.

Full Access
Question # 24

When setting up a Network Function VM for Service Insertion, an administrator needs to configure the vNICs that will be used for redirecting traffic. What is the correct configuration for the vNICs on the Network Function VM?

A.

Two specific Network Function vNICs must be created, one for inbound traffic and the other for outbound traffic.

B.

A single vNIC of type Network Function is required, which handles both ingress and egress traffic.

C.

Two Network Function vNICs are required that must be assigned static IP addresses from a managed IPAM network.

D.

Two standard vNICs are required, one for ingress and one for egress and must be on a trunked VLAN.

Full Access
Question # 25

What entity is automatically created on the cluster hosting Prism Central when Microsegmentation is enabled?

A.

A storage container named flow_data is created.

B.

A Bucket named flow_data is created.

C.

A File Share named flow_data is created.

D.

A virtual machine named flow_data is created.

Full Access
Question # 26

Which policy is used to isolate a compromised VM in the most efficient way possible?

A.

Isolation Policy

B.

Quarantine Policy

C.

Shared Service Policy

D.

Application Policy

Full Access
Question # 27

In Nutanix Flow, which action transitions a security policy from observing traffic to actively enforcing the rules?

A.

Disable Traffic Visualization for the policy.

B.

Enforce policy by setting its scope.

C.

Change policy mode from Monitor to Save.

D.

Change policy mode from Monitor to Enforce.

Full Access
Question # 28

An administrator finds that App tier VMs cannot connect to the Database tier on port 3306, and Flow logs show the traffic is being denied by a security policy. The Web tier communicates normally. What should the administrator do to allow the App tier to access the Database tier?

A.

Update the microsegmentation policy in Nutanix Flow to allow App - > Database traffic on port 3306.

B.

Delete all existing Flow policies and recreate them from scratch.

C.

Enable NAT for the Database tier to allow connections from the App tier.

D.

Change the Database tier subnet to match the App tier subnet.

Full Access
Question # 29

Refer to Exhibit:

In the AD-VDI Departmental SecPol policy shown in the exhibit, ADGroup: Engineering is configured as a secured entity in a VDI Security Policy. Prism Central shows 2 / 2 active sessions under this group, but the administrator confirms that three Engineering users are currently logged in to persistent VDI desktops. The third user's VM shows no ADGroup assignment in its VM details in Prism Central, even after the user has successfully logged in. All three users are members of the same AD group, and the Domain Controller event logs confirm a successful interactive login for the third user. Which condition explains why the third user's VM is not being assigned the ADGroup: Engineering category?

A.

The Active Directory Service account used by Prism Central is locked.

B.

The third user's VM has been assigned an AppType category, preventing ID-Based categorization.

C.

The Flow Identity Service has been disabled in Prism Central for the VM the third user is logging in to.

D.

The Flow Network Security policy scope does not include the VLAN where the third user's VM resides.

Full Access
Question # 30

An administrator is responsible for managing user access to a Nutanix cluster... configure custom user roles... What is the first step in configuring and managing user roles for a Nutanix cluster?

A.

Create the requisite Authorization Polices from custom or built-in roles.

B.

Modify the administrator role to restrict access to critical system functions.

C.

Disable default roles and create new roles for each team.

D.

Create the requisite Custom Roles from custom or built-in Authorization Polices.

Full Access
Question # 31

Which policy type takes highest precedence in Enforce mode?

A.

Application

B.

Isolation

C.

Quarantine

D.

Shared Service

Full Access