Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Nutanix NCP-NS NCP-NS-7.5 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

During a security review, the administrator confirms that the existing security policy does not explicitly allow traffic from Environment: Development to Environment: Production. A VM in the Development category was still able to reach a Production VM over IPv6. What is the most likely cause of this behavior?

Options:

A.

An isolation policy was incorrectly applied instead of an application policy.


B.

The Allow All IPv6 option in the policy was selected.


C.

The policy was misconfigured and allowed all Layer 2 broadcast traffic.


D.

The VM was using a static IPv6 address.


Expert Solution
Questions # 2:

An administrator creates a new VPC in No NAT mode to allow VMs in a web tier to reach an external firewall. After deployment... none of the VMs can reach external IP addresses... Which action should the administrator take to restore routed north-south connectivity from the VPC?

Options:

A.

Configure a Flow Security Policy to allow egress traffic from the VPC subnet.


B.

Create an Externally Routable Prefix (ERP) entry for the overlay subnet in the VPC.


C.

Change the VPC mode to NAT so that outbound traffic is automatically translated.


D.

Add a default static route in each VM pointing to the external firewall's IP address.


Expert Solution
Questions # 3:

Which policy type takes highest precedence in Enforce mode?

Options:

A.

Application


B.

Isolation


C.

Quarantine


D.

Shared Service


Expert Solution
Questions # 4:

Which statement is correct about cloning Application Security Policies?

Options:

A.

The system prevents saving the cloned policy if it has the same secured entities as the original.


B.

The policy type can be changed while cloning a policy.


C.

Only one policy can be cloned at a time.


D.

The default name of the cloned policy must be manually entered; the system does not provide a default.


Expert Solution
Questions # 5:

An administrator has been tasked with configuring virtual switches and setting the appropriate MTU size for a Nutanix cluster to optimize network performance. The cluster needs to support high-throughput traffic between VMs and ensure compatibility with external networks. The administrator needs to configure the virtual switches and MTU size to enable jumbo frames while ensuring that all nodes and network components are properly aligned to prevent packet loss or fragmentation. What is the first step to configure the virtual switches and MTU size in a Nutanix cluster for optimal network performance?

Options:

A.

Enable multicast filtering on the virtual switches to optimize MTU configuration.


B.

Set the MTU size to 1500 on the Nutanix virtual switches and configure a separate VLAN for MTU traffic.


C.

Set the MTU size to 1500 on all nodes and virtual switches for compatibility with external networks.


D.

Configure the MTU size to 9000 on all nodes and virtual switches, and verify that all physical network switches support jumbo frames.


Expert Solution
Questions # 6:

When setting up a Network Function VM for Service Insertion, an administrator needs to configure the vNICs that will be used for redirecting traffic. What is the correct configuration for the vNICs on the Network Function VM?

Options:

A.

Two specific Network Function vNICs must be created, one for inbound traffic and the other for outbound traffic.


B.

A single vNIC of type Network Function is required, which handles both ingress and egress traffic.


C.

Two Network Function vNICs are required that must be assigned static IP addresses from a managed IPAM network.


D.

Two standard vNICs are required, one for ingress and one for egress and must be on a trunked VLAN.


Expert Solution
Questions # 7:

An administrator sets up a VPN between two Nutanix VPCs in different Availability Zones. After deployment, the VPN tunnel shows as Up, but traffic between the VPCs is not flowing. Which configuration step is most likely missing?

Options:

A.

NAT policy on each of the VPC routers


B.

IPsec encryption settings on the VPN profile


C.

MTU adjustment on the AHV hosts


D.

Static routes for remote subnets on the VPC


Expert Solution
Questions # 8:

An administrator needs to ensure all web traffic (HTTP/HTTPS) from a specific subnet (10.100.20.0/24) is redirected through a third-party virtual firewall inside the VPC for Layer 7 inspection before reaching the internet. The firewall VM has an IP of 10.100.30.5 and is connected to a different subnet. What should be done to enforce this specific traffic path?

Options:

A.

Configure a Policy-Based Route (PBR) on the VPC with a re-route IP 10.100.30.5.


B.

Create a FNS policy with an allow rule for the FW IP 10.100.30.5.


C.

Move the Firewall VM into the same subnet and set the default GW of the web servers to 10.100.30.5.


D.

Create a Network Policy with a high priority with the source 10.100.20.0/24, destination of 10.100.30.5 on port 80 & 443.


Expert Solution
Questions # 9:

When creating a VPC, enabling the Transit VPC toggle changes the role of the VPC. What does the Transit VPC toggle do?

Options:

A.

Forces NAT for all external subnets


B.

Creates a hub-and-spoke VPC for routing


C.

Converts all Overlay subnets into VLAN subnets


D.

Enables DHCP relay for routed subnets


Expert Solution
Questions # 10:

An administrator has two user VPCs connected via a Transit VPC. Routing works for most subnets, but one overlay subnet cannot reach external networks. What is the most probable cause?

Options:

A.

Incorrect ASN in the BGP configuration in the Transit VPC


B.

Mismatch in ERP configuration in user and Transit VPC


C.

Floating IP not assigned to the gateway


D.

DHCP configuration is disabled on the overlay subnet in the user VPC


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions