Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 NCP-NS-7.5 Question # 29 Topic 3 Discussion

Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 NCP-NS-7.5 Question # 29 Topic 3 Discussion

NCP-NS-7.5 Exam Topic 3 Question 29 Discussion:
Question #: 29
Topic #: 3

An administrator uses Nutanix Flow to secure a three-tier application (Web, App, and Database tiers). After observing the traffic, they find that: The Web tier communicates with the App tier over HTTP (port 80) The App tier communicates with the Database tier over TCP port 1433 The Database tier does not initiate connections The Web tier receives inbound HTTP traffic from the corporate DMZ on port 8080 No other traffic should be allowed What should the administrator do to document and then securely apply these flows in Nutanix Flow?


A.

Use Flow Network Visualization to capture observed flows and convert them into microsegmentation security policies.


B.

Add all VMs to a single security policy to simplify communication.


C.

Disable traffic-flow discovery and configure all policies manually.


D.

Manually create isolation policies between all VMs in the environment.


Get Premium NCP-NS-7.5 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.