Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 4
Total 31 questions
Exam Code: NCP-NS-7.5                Update: Apr 19, 2026
Exam Name: Nutanix Certified Professional - Network and Security (NCP-NS) 7.5

Nutanix Nutanix Certified Professional - Network and Security (NCP-NS) 7.5 NCP-NS-7.5 Exam Dumps: Updated Questions & Answers (April 2026)

Question # 1

An administrator is deploying a multi-tier (web, app, database) application on a Nutanix cluster using AHV. The administrator needs to allow internal communication between tiers and provide external access to the web tier. How should the administrator satisfy this requirement?

A.

Create separate VLAN networks for each tier and configure routing on the physical network.

B.

Create a VPC with a single subnet and assign workloads of each tier to this subnet.

C.

Create separate VPCs for each tier and connect them to the same external NAT network and configure routing policies for inter-tier traffic.

D.

Create a VPC with subnets for each tier and configure the Externally Routable Prefix to include only web subnets.

Question # 2

Which statement is correct about cloning Application Security Policies?

A.

The system prevents saving the cloned policy if it has the same secured entities as the original.

B.

The policy type can be changed while cloning a policy.

C.

Only one policy can be cloned at a time.

D.

The default name of the cloned policy must be manually entered; the system does not provide a default.

Question # 3

An administrator creates a new VPC in No NAT mode to allow VMs in a web tier to reach an external firewall. After deployment... none of the VMs can reach external IP addresses... Which action should the administrator take to restore routed north-south connectivity from the VPC?

A.

Configure a Flow Security Policy to allow egress traffic from the VPC subnet.

B.

Create an Externally Routable Prefix (ERP) entry for the overlay subnet in the VPC.

C.

Change the VPC mode to NAT so that outbound traffic is automatically translated.

D.

Add a default static route in each VM pointing to the external firewall's IP address.

Question # 4

An administrator has observed the following message: Which two statements most accurately describe the security hitlog captured above? (Choose two.)

A.

This is a security hit log on the rule name "Production-External-WebTier".

B.

The source ip address is 10.38.174.5 and source port is TCP/123.

C.

86.108.190.23 is sending a packet on UDP 123.

D.

10.38.174.57 is sending a packet destined to UDP 123.

Question # 5

How can the administrator discover the root cause of the issue?

A.

Confirm that Inter-VM connectivity is enabled within the VM networking settings and that VMs in the Database tier are configured correctly to accept inbound traffic.

B.

Check if traffic isolation has been configured on the Database tier and ensure that there is no policy preventing App tier communication with the Database tier.

C.

Check the security policies again to ensure that the rule allowing port 3306 from Web - > Database is applied and active, then check the policy enforcement mode to ensure it is in Enforcement Mode.

D.

Verify that the port 3306 is open on the external gateway and that SNAT is not being applied for internal communication.

Question # 6

An administrator needs to configure a security policy that controls VM-to-VM communication within a category defined as secured entity. Which configuration action should the administrator take to restrict all intra-tier communication between the VMs within a category defined as secured entity?

A.

Apply the policy with inbound rules that block all inter-VM communication.

B.

Configure the security policy with allow-all intra-tier traffic.

C.

Set the security policy to allow-specific traffic for intra-tier communication.

D.

Use deny-all intra-tier traffic configuration in the policy.

Question # 7

Which statement best describes the function of an External Network in Flow Virtual Networking?

A.

It acts as the entry and exit point for traffic to and from a VPC.

B.

It enables communication between subnets within a VPC.

C.

It enables communication between VPCs.

D.

Each VPC requires a dedicated External Network that cannot be shared.

Question # 8

A newly-deployed Flow Virtual Networking VPC environment is experiencing connectivity issues... A packet capture on the physical switch shows packets are being fragmented. What is the probable cause of the packet fragmentation and performance issues?

A.

A Network Security Group is incorrectly filtering IP fragments.

B.

The MTU on the physical or virtual switch layer is set too low.

C.

The VM's guest OS network driver is faulty and requires an update.

D.

The VPC's external network uplink has an incorrect VLAN ID configured.

Question # 9

An administrator needs to delegate the management of security policies to a dedicated SecOps team. To enforce the principle of least privilege, the administrator assigns the predefined Flow Policy Author role to a user on the team. The user confirms they can create, monitor, and enforce security policies. However, when attempting to build a new application security policy for a set of newly deployed VMs, the user reports they are unable to create a new category to group these VMs. The option is not available in the Prism Central UI. Which statement explains this behavior?

A.

The Flow Policy Author role must be cloned into a custom role before it can be used.

B.

The user's role must be assigned with a scope for the specific projects they manage.

C.

The user is missing the Flow Admin role, which is required for category management.

D.

The Flow Policy Author role can only apply policies to existing categories by design.

Question # 10

An administrator wants to configure the subnet 10.1.1.0/24 to stretch across two VPCs over a Network Gateway in VXLAN mode. The VMs on this subnet need to communicate with a traffic pattern of size 2000 Bytes. What is the minimum MTU required in the underlay network to ensure communication happens without fragmentation or traffic drops?

A.

2058 Bytes

B.

2108 Bytes

C.

2116 Bytes

D.

9216 Bytes

Page: 1 / 4
Total 31 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 19 Apr 2026