Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 NCP-NS-7.5 Question # 17 Topic 2 Discussion
NCP-NS-7.5 Exam Topic 2 Question 17 Discussion:
Question #: 17
Topic #: 2
An administrator plans to upgrade the Network Controller in a Flow Virtual Networking deployment. The environment includes multiple AHV clusters managed by Prism Central. Which prerequisite must be verified before upgrading the Network Controller?
A.
Flow Network Security must be upgraded to the target release before upgrading the Network Controller.
B.
Each cluster must be running the Flow Network Security version specified as compatible with the target Network Controller release.
C.
Each cluster must be running AHV versions compatible with the target Network Controller release.
D.
Network Controller Prism Element upgrades must be applied before before Network Controller Prism Central upgrades can be applied.
A reliable method here is to translate the scenario into Nutanix terms—VPC routing, external connectivity, policy scope, identity mapping, or upgrade readiness—and then choose the answer that directly addresses that domain. The correct response is A, meaning “Flow Network Security must be upgraded to the target release before upgrading the Network Controller.”. The Network Controller supplies the control-plane services required for Flow Virtual Networking. Without it, Prism Central cannot build and manage overlays, gateways, and related virtual networking constructs consistently across the cluster. In lifecycle terms, Nutanix expects administrators to respect prerequisites, compatibility, and dependency order before enabling or upgrading Flow-related services.
In other words, this is less about broad infrastructure suspicion and more about finding the exact Nutanix decision point that explains the behavior. Notice that B does not fit because it targets a different layer of the Nutanix networking and security stack than the one causing the outcome here. C does not fit because it targets a different layer of the Nutanix networking and security stack than the one causing the outcome here. Seen operationally, the correct response is the least disruptive and most deterministic one. It changes the exact Nutanix setting that governs the outcome instead of introducing workarounds elsewhere in the stack.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit