Pre-Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

NCP-NS-7.5 Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 Questions and Answers

Questions 4

An administrator has a VPC with multiple overlay subnets and a VPN gateway configured for site-to-site connectivity. During testing, the administrator noticed fragmented packets and poor performance. Which configuration change resolves this issue without disabling VPN?

Options:

A.

Increase MTU to 1500 on guest VMs

B.

Enable jumbo frames on VLAN subnets

C.

Reduce MTU to 1356 on guest VMs

D.

Disable Geneve encapsulation

Buy Now
Questions 5

An administrator needs to allow communication between several VPCs without requiring to configure routes in the physical network or using a dynamic routing protocol like BGP. How should the administrator satisfy this requirement?

Options:

A.

Merge all the subnets into a single VPC.

B.

Peer the VPCs directly.

C.

Configure a VPN network between each of the VPCs.

D.

Connect the VPCs to a single Transit VPC.

Buy Now
Questions 6

During a security review, the administrator confirms that the existing security policy does not explicitly allow traffic from Environment: Development to Environment: Production. A VM in the Development category was still able to reach a Production VM over IPv6. What is the most likely cause of this behavior?

Options:

A.

An isolation policy was incorrectly applied instead of an application policy.

B.

The Allow All IPv6 option in the policy was selected.

C.

The policy was misconfigured and allowed all Layer 2 broadcast traffic.

D.

The VM was using a static IPv6 address.

Buy Now
Questions 7

In Nutanix Flow, which action transitions a security policy from observing traffic to actively enforcing the rules?

Options:

A.

Disable Traffic Visualization for the policy.

B.

Enforce policy by setting its scope.

C.

Change policy mode from Monitor to Save.

D.

Change policy mode from Monitor to Enforce.

Buy Now
Questions 8

Before creating a new Application Security Policy in Prism Central, what prerequisite must exist?

Options:

A.

A category key/value pair must be defined for use in the policy.

B.

Flow Network Security must be enabled on all registered clusters.

C.

Targeted VMs must have category assignments.

D.

The Network Controller must be deployed on each cluster in the policy's scope.

Buy Now
Questions 9

While configuring a new security policy in a Nutanix microsegmentation environment, an administrator wants the policy to remain flexible even if virtual machines change subnets or obtain new IP addresses. Which configuration approach should the administrator use when defining the policy scope?

Options:

A.

Configure the policy only on specific VLAN IDs.

B.

Use VM categories to define the secured and allowed entities.

C.

Apply the policy after setting static routes for each VM.

D.

Assign IP addresses manually to all VMs included in the policy.

Buy Now
Questions 10

Refer to Exhibit:

NCP-NS-7.5 Question 10

An organization uses an FNS-NG Service Chain to steer application traffic through a pair of third-party firewall Network Function VMs operating in Active/Standby mode. Users suddenly report that all application access is blocked. The administrator reviews Prism Central - > Network & Security - > Network Functions, where the summary shown in the exhibit is displayed. Additional information: Alert: "Network Function 'PANW Service Insertion' virtual NIC pair(s) are unhealthy." Both firewall VMs are powered on and reachable. The security policy using the service chain has not been changed. Based on the exhibit and findings, what is the most likely cause of the traffic outage?

Options:

A.

The service-chain health check failed to reroute sessions to the healthy firewall.

B.

One of the Network Function vNIC pairs lost dataplane connectivity, interrupting traffic until health is stabilized.

C.

Firewall policy synchronization was not configured when the standby firewall became active.

D.

The inbound vNIC on SE-PA-VM Firewall-2 failed, preventing redirected packets from reaching the firewall.

Buy Now
Questions 11

When creating a VPC, enabling the Transit VPC toggle changes the role of the VPC. What does the Transit VPC toggle do?

Options:

A.

Forces NAT for all external subnets

B.

Creates a hub-and-spoke VPC for routing

C.

Converts all Overlay subnets into VLAN subnets

D.

Enables DHCP relay for routed subnets

Buy Now
Questions 12

What type of policy would be used to block all traffic between VMs in the category Environment:Sandbox and VMs in the category Environment:Production?

Options:

A.

Quarantine Policy

B.

Application Policy

C.

Isolation Policy

D.

Shared Services Policy

Buy Now
Questions 13

An administrator is deploying a new multi-tenant environment in Prism Central and has created a VPC named TenantVPC1. The administrator needs to enable external connectivity for this VPC so that some services inside the VPC can be accessed from the corporate network without NAT translation, while other services require Internet access through SNAT translation. The administrator plans to use an External Network(s) to provision this connectivity. Which configuration should the administrator apply to satisfy this requirement?

Options:

A.

Create two External Networks for TenantVPC1: one NAT (for Internet access) and one Routed/No-NAT (for corporate network access). Attach both to the VPC.

B.

Create two External Networks both of type Routed/No-NAT and attach both to TenantVPC1, one for corporate access and one for internet access.

C.

Create a single External Network of type NAT only and attach it to TenantVPC1. Define SNAT and Floating IPs for both the corporate-network services and internet-facing services.

D.

Create one External Network of type Routed/No-NAT only, attach to TenantVPC1, and configure routing policy to translate IP addresses for internet-facing services.

Buy Now
Questions 14

An administrator finds that App tier VMs cannot connect to the Database tier on port 3306, and Flow logs show the traffic is being denied by a security policy. The Web tier communicates normally. What should the administrator do to allow the App tier to access the Database tier?

Options:

A.

Update the microsegmentation policy in Nutanix Flow to allow App - > Database traffic on port 3306.

B.

Delete all existing Flow policies and recreate them from scratch.

C.

Enable NAT for the Database tier to allow connections from the App tier.

D.

Change the Database tier subnet to match the App tier subnet.

Buy Now
Questions 15

An administrator has been tasked with configuring virtual switches and setting the appropriate MTU size for a Nutanix cluster to optimize network performance. The cluster needs to support high-throughput traffic between VMs and ensure compatibility with external networks. The administrator needs to configure the virtual switches and MTU size to enable jumbo frames while ensuring that all nodes and network components are properly aligned to prevent packet loss or fragmentation. What is the first step to configure the virtual switches and MTU size in a Nutanix cluster for optimal network performance?

Options:

A.

Enable multicast filtering on the virtual switches to optimize MTU configuration.

B.

Set the MTU size to 1500 on the Nutanix virtual switches and configure a separate VLAN for MTU traffic.

C.

Set the MTU size to 1500 on all nodes and virtual switches for compatibility with external networks.

D.

Configure the MTU size to 9000 on all nodes and virtual switches, and verify that all physical network switches support jumbo frames.

Buy Now
Questions 16

An administrator observes a Network Controller Unreachable alert in Prism Central for a specific AHV cluster. All other management tasks for the cluster from Prism Central are succeeding and the cluster itself reports a healthy status. Which step is the most appropriate to investigate the cause of this specific alert?

Options:

A.

On the affected Prism Element cluster, verify that the Network Controller service is enabled and healthy on all CVMs.

B.

Verify physical network connectivity and MTU settings between Prism Central and the affected AHV hosts.

C.

Check for and restart any unhealthy Flow Virtual Networking microservices within the Prism Central scale-out architecture.

D.

Unregister and then re-register the affected cluster in Prism Central to force a full synchronization of the network controller state.

Buy Now
Questions 17

Exhibit:

NCP-NS-7.5 Question 17

A VM with IP address 172.20.9.5 resides on a subnet with CIDR 172.20.9.0/24. The VPC is successfully peered via BGP with an external router... External networks outside the VPC are unable to reach the VM. What configuration change should be made to enable reachability for the VM?

Options:

A.

Modify the ERP values within the VPC to advertise a CIDR of 172.20.8.0/22

B.

Apply a PBR rule for the VM's address forwarding traffic to the IP of the No-NAT external Gateway address

C.

Apply a default route to the VPC sending all traffic to the NAT External Network

D.

Associate a NAT external network to the VPC and apply a floating IP address to the VM

Buy Now
Questions 18

Refer to Exhibit:

NCP-NS-7.5 Question 18

How should an Application Policy be created whose rules apply only to vNIC1 of VM1?

Options:

A.

Create an Entity Group with Cat:SubnetA and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

B.

Add Cat:SubnetA as secured entity in the Application Policy.

C.

Create an Entity Group with Cat:SubnetA, Cat:SubnetB and Cat:VM1 and then add the Entity Group as Secured Entity to the Application Policy.

D.

Add Cat:SubnetA and Cat:VM1 as secured entity in the Application Policy.

Buy Now
Questions 19

Refer to Exhibit:

NCP-NS-7.5 Question 19

An administrator has been tasked with troubleshooting why the servers in the Web Category are not able to ping the servers in the App Category. Why is this issue occurring?

Options:

A.

ICMP is not allowed between the Web and App categories.

B.

The firewall on the App Servers is blocking Ping packets.

C.

Ping is not installed in the Web Servers.

D.

The servers are not in the same category.

Buy Now
Questions 20

An administrator is responsible for managing user access to a Nutanix cluster... configure custom user roles... What is the first step in configuring and managing user roles for a Nutanix cluster?

Options:

A.

Create the requisite Authorization Polices from custom or built-in roles.

B.

Modify the administrator role to restrict access to critical system functions.

C.

Disable default roles and create new roles for each team.

D.

Create the requisite Custom Roles from custom or built-in Authorization Polices.

Buy Now
Questions 21

An administrator uses Nutanix Flow to secure a three-tier application (Web, App, and Database tiers). After observing the traffic, they find that: The Web tier communicates with the App tier over HTTP (port 80) The App tier communicates with the Database tier over TCP port 1433 The Database tier does not initiate connections The Web tier receives inbound HTTP traffic from the corporate DMZ on port 8080 No other traffic should be allowed What should the administrator do to document and then securely apply these flows in Nutanix Flow?

Options:

A.

Use Flow Network Visualization to capture observed flows and convert them into microsegmentation security policies.

B.

Add all VMs to a single security policy to simplify communication.

C.

Disable traffic-flow discovery and configure all policies manually.

D.

Manually create isolation policies between all VMs in the environment.

Buy Now
Questions 22

What happens when a monitored policy is enforced?

Options:

A.

Stops logging traffic

B.

Blocks all traffic that is not allowed

C.

Deletes the policy hitlogs

D.

Removes all discovered flows

Buy Now
Questions 23

Exhibit:

NCP-NS-7.5 Question 23

An administrator needs to setup a Syslog server to capture the Flow Network Security Hit logs. Which module name should be selected?

Options:

A.

Flow Service Logs

B.

API Audit

C.

Security Policy Hit logs

D.

Audit

Buy Now
Questions 24

The alert details mention a specific external network. Attempts to assign new Floating IPs to VMs fail, but existing Floating IPs continue to work. What is the cause of this alert?

Options:

A.

A firewall is blocking communication between Prism Central and the VPC's virtual router.

B.

The VPC's connection to the external network is down.

C.

A firewall is blocking communication between Prism Central and the VPC's virtual router.

D.

There are no more available IP addresses in the address pool configured for Floating IPs in that external network.

Buy Now
Questions 25

An administrator creates an Isolation Policy in Prism Central to prevent communication between the Prod and Staging environments. The policy is in Enforce mode... but VMs in the two environments can still communicate. Which configuration issue most likely explains why the Isolation Policy is not blocking the traffic?

Options:

A.

The Isolation Policy does not specify any services/ports, so no traffic is matched for enforcement.

B.

Isolation Policies restrict north-south communication when associated with a VPC gateway, not east-west traffic between categories.

C.

An Application Policy allows traffic between the same categories, overriding this policy.

D.

The Prod and Staging categories have not been assigned to the VMs, so the policy does not apply.

Buy Now
Questions 26

A newly-deployed Flow Virtual Networking VPC environment is experiencing connectivity issues... A packet capture on the physical switch shows packets are being fragmented. What is the probable cause of the packet fragmentation and performance issues?

Options:

A.

A Network Security Group is incorrectly filtering IP fragments.

B.

The MTU on the physical or virtual switch layer is set too low.

C.

The VM's guest OS network driver is faulty and requires an update.

D.

The VPC's external network uplink has an incorrect VLAN ID configured.

Buy Now
Questions 27

An administrator has deployed a VPC for a multi-tier application on Nutanix AHV. The Web tier requires public internet access, while the App and Database tiers must remain private and isolated. Which steps should the administrator take to configure the external network correctly?

Options:

A.

Use overlay networks for external access instead of configuring a VPC external network.

B.

Assign external IPs to all VMs in the VPC to simplify connectivity.

C.

Configure an external network for the Web tier subnet and leave App and Database tiers private.

D.

Attach a single external network to the VPC and allow all tiers unrestricted internet access.

Buy Now
Questions 28

An administrator is configuring a Nutanix environment for Flow Network Security Next-Gen. Where should the MTU be set to ensure that Geneve encapsulation overhead is properly accounted for?

Options:

A.

On the CVM's virtual network interfaces

B.

On the AHV host's physical network interfaces

C.

On the virtual switch within Prism Central

D.

On the upstream virtual router

Buy Now
Questions 29

A VPC admin creates a policy to allow traffic between two IP subnets but forgets to enable reverse direction. What happens in this scenario?

Options:

A.

Traffic is blocked completely because the policy is invalid.

B.

Policy is rejected by Prism Central during validation.

C.

Traffic flows bidirectionally because policies are stateful by default.

D.

Traffic flows only in one direction, blocking return traffic.

Buy Now
Questions 30

Which statement best describes the function of an External Network in Flow Virtual Networking?

Options:

A.

It acts as the entry and exit point for traffic to and from a VPC.

B.

It enables communication between subnets within a VPC.

C.

It enables communication between VPCs.

D.

Each VPC requires a dedicated External Network that cannot be shared.

Buy Now
Questions 31

An administrator creates a VPC named AppVPC1 in Nutanix Cloud Infrastructure (NCI) with separate subnets for the web, app, and database tiers. The database subnet must remain isolated from external networks; however, all tiers need to communicate with each other internally. What should the administrator configure to limit external access to only the web and app subnets?

Options:

A.

Enable NAT Gateway on the database subnet for outbound communication.

B.

Configure a routing policy in the VPC to deny external traffic to and from the database subnet.

C.

Attach the web and app subnets to the external network through an AHV managed bridge.

D.

Create Static Routes on the physical network to interconnect the VPC subnets.

Buy Now
Exam Code: NCP-NS-7.5
Exam Name: Nutanix Certified Professional - Network and Security (NCP-NS) 7.5
Last Update: Apr 19, 2026
Questions: 106

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now NCP-NS-7.5 testing engine

PDF (Q&A)

$31.5  $104.99
buy now NCP-NS-7.5 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Apr 2026