Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-NS-7.5 - Nutanix Certified Professional - Network and Security (NCP-NS) 7.5

Page: 3 / 4
Total 106 questions

Users have recently reported intermittent connectivity issues and slower-than-usual application performance for a Nutanix cluster to an administrator. The administrator needs to identify the root cause of these issues by analyzing the health of the infrastructure components. What action should the administrator take first to diagnose the root cause of the problem?

A.

Review cluster health status, checking for any warnings or alerts relevant to the performance issues.

B.

Enable network QoS to prioritize the performance of critical applications.

C.

Rebalance virtual machines across the cluster to balance resource load and improve performance.

D.

Reboot the Nutanix cluster nodes to clear any potential performance-related cache or memory issues.

When cloning a Flow Network Security policy, what should be verified before enabling Enforce mode?

A.

The cloned policy's secured entities reference the intended categories.

B.

The cloned policy is configured to a different scope than the source policy.

C.

The cloned policy must first be saved before it can be enforced.

D.

The cloned policy must be renamed before it can be enforced.

In a Nutanix deployment, when is the Network Controller automatically enabled?

A.

When the Small Prism Central deployment is scaled out to three PCVM's

B.

When the Network Controller is manually configured from the Prism Central settings page

C.

When the Network Controller is enabled on a Hyper-V cluster

D.

When the X-Large Prism Central deployment is installed or upgraded

What happens when a monitored policy is enforced?

A.

Stops logging traffic

B.

Blocks all traffic that is not allowed

C.

Deletes the policy hitlogs

D.

Removes all discovered flows

A junior network operator is assigned two predefined roles in Prism Central... Role A: Prism Viewer Role B: VPC Admin The operator reports being able to successfully create, update, and delete Virtual Private Clouds (VPCs). However, the operator is unable to create a VM into the VPC. How does Prism Central determine the operator's effective permissions?

A.

The system applies the principle of "most privilege," granting the highest level of access from any assigned role.

B.

The permissions of the VPC Admin role override the more restrictive Prism Viewer role.

C.

The Prism Viewer role's permissions take precedence, preventing any write operations from the VPC Admin role.

D.

The permissions are the union of both roles, granting VPC management rights and global read-only access.

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

An administrator wants to configure the subnet 10.1.1.0/24 to stretch across two VPCs over a Network Gateway in VXLAN mode. The VMs on this subnet need to communicate with a traffic pattern of size 2000 Bytes. What is the minimum MTU required in the underlay network to ensure communication happens without fragmentation or traffic drops?

A.

2058 Bytes

B.

2108 Bytes

C.

2116 Bytes

D.

9216 Bytes

An administrator is designing a Transit VPC to provide shared corporate services (e.g., DNS) for two tenant VPCs: VPC-A requires WAN access using NAT. VPC-B requires WAN access without NAT. Both VPCs connect to the Transit VPC for shared services hosted on the corporate network. Shared services residing in the Transit VPC use routed IP addressing for WAN connectivity. Which two configuration elements should the administrator implement on the Transit VPC? (Choose two.)

A.

Associate both a NAT and a No-NAT external VLAN to the Transit VPC to support separate egress paths.

B.

Create two Overlay external subnets in the Transit VPC: one for VPC-A and one for VPC-B.

C.

Use one Overlay external subnet in the Transit VPC to which both VPCs will connect.

D.

Associate one No-NAT external VLAN to the Transit VPC router for underlay connectivity.

An administrator observes a Network Controller Unreachable alert in Prism Central for a specific AHV cluster. All other management tasks for the cluster from Prism Central are succeeding and the cluster itself reports a healthy status. Which step is the most appropriate to investigate the cause of this specific alert?

A.

On the affected Prism Element cluster, verify that the Network Controller service is enabled and healthy on all CVMs.

B.

Verify physical network connectivity and MTU settings between Prism Central and the affected AHV hosts.

C.

Check for and restart any unhealthy Flow Virtual Networking microservices within the Prism Central scale-out architecture.

D.

Unregister and then re-register the affected cluster in Prism Central to force a full synchronization of the network controller state.

Exhibit:

An administrator needs to setup a Syslog server to capture the Flow Network Security Hit logs. Which module name should be selected?

A.

Flow Service Logs

B.

API Audit

C.

Security Policy Hit logs

D.

Audit