Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Nutanix NCP-NS-7.5 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which policy mode blocks all traffic that is not explicitly allowed by the policy?

Options:
A.

Monitor Mode

B.

Save Mode

C.

Block Mode

D.

Enforce Mode

Nutanix NCP-NS-7.5 Premium Access
Questions 12

An administrator has been tasked with configuring virtual switches and setting the appropriate MTU size for a Nutanix cluster to optimize network performance. The cluster needs to support high-throughput traffic between VMs and ensure compatibility with external networks. The administrator needs to configure the virtual switches and MTU size to enable jumbo frames while ensuring that all nodes and network components are properly aligned to prevent packet loss or fragmentation. What is the first step to configure the virtual switches and MTU size in a Nutanix cluster for optimal network performance?

Options:
A.

Enable multicast filtering on the virtual switches to optimize MTU configuration.

B.

Set the MTU size to 1500 on the Nutanix virtual switches and configure a separate VLAN for MTU traffic.

C.

Set the MTU size to 1500 on all nodes and virtual switches for compatibility with external networks.

D.

Configure the MTU size to 9000 on all nodes and virtual switches, and verify that all physical network switches support jumbo frames.

Questions 13

An administrator is responsible for managing user access to a Nutanix cluster... configure custom user roles... What is the first step in configuring and managing user roles for a Nutanix cluster?

Options:
A.

Create the requisite Authorization Polices from custom or built-in roles.

B.

Modify the administrator role to restrict access to critical system functions.

C.

Disable default roles and create new roles for each team.

D.

Create the requisite Custom Roles from custom or built-in Authorization Polices.

Questions 14

What is the role of the Network Controller in Flow Virtual Networking?

Options:
A.

Distribute the network traffic load across multiple guest VMs efficiently.

B.

It enables you to configure and manage common administrative tasks that are applicable to the platform and various Nutanix apps.

C.

It is used to create VPN, VTEP, or BGP gateways to connect subnets using VPN connections, Layer 2 subnet extensions over VPN or VTEP, or over BGP session.

D.

It manages configuration, monitoring, and optimization of network resources.

Questions 15

Which policy is used to isolate a compromised VM in the most efficient way possible?

Options:
A.

Isolation Policy

B.

Quarantine Policy

C.

Shared Service Policy

D.

Application Policy

Questions 16

Which action allows an administrator to reuse a single existing policy in a different scope?

Options:
A.

Place policy in Enforce mode

B.

Clone

C.

Place policy in Monitor mode

D.

Export

Questions 17

Which statement accurately describes the behavior of a Flow Network Security policy operating in Monitor mode?

Options:
A.

All matching traffic is discovered and denied, but not allowed.

B.

Traffic is blocked unless it matches an "allow" rule in Enforce mode.

C.

Only East-West traffic is discovered, but North-South traffic is not.

D.

All matching traffic is discovered and allowed, but not blocked.

Questions 18

An administrator has deployed a microsegmentation policy in Nutanix Flow that allows certain VM traffic based on Active Directory (AD) user group membership. Users in a specific AD group report they are unable to access the VMs, while other users can connect without issues. The administrator suspects the problem is related to identity-based policy mapping. What should the administrator do to troubleshoot and resolve the access issue related to the identity-based policy?

Options:
A.

Add the IP addresses of the blocked VMs to the Inbound ruleset.

B.

Ensure the VMs are associated to the proper AD group categories.

C.

Reboot all VMs associated with the policy to refresh their security group mapping.

D.

Verify that the affected users are members of the mapped AD group.

Questions 19

Exhibit:

NCP-NS-7.5 Question 19

A VM with IP address 172.20.9.5 resides on a subnet with CIDR 172.20.9.0/24. The VPC is successfully peered via BGP with an external router... External networks outside the VPC are unable to reach the VM. What configuration change should be made to enable reachability for the VM?

Options:
A.

Modify the ERP values within the VPC to advertise a CIDR of 172.20.8.0/22

B.

Apply a PBR rule for the VM's address forwarding traffic to the IP of the No-NAT external Gateway address

C.

Apply a default route to the VPC sending all traffic to the NAT External Network

D.

Associate a NAT external network to the VPC and apply a floating IP address to the VM

Questions 20

An administrator sets up a VPN between two Nutanix VPCs in different Availability Zones. After deployment, the VPN tunnel shows as Up, but traffic between the VPCs is not flowing. Which configuration step is most likely missing?

Options:
A.

NAT policy on each of the VPC routers

B.

IPsec encryption settings on the VPN profile

C.

MTU adjustment on the AHV hosts

D.

Static routes for remote subnets on the VPC

Exam Code: NCP-NS-7.5
Certification Provider: Nutanix
Exam Name: Nutanix Certified Professional - Network and Security (NCP-NS) 7.5
Last Update: Apr 26, 2026
Questions: 106