Exam PCNSA All QuestionsBrowse all questions from this exam
Question 158

During the packet flow process, which two processes are performed in application identification? (Choose two.)

    Correct Answer: A, B

    During the packet flow process, pattern-based application identification is used to identify applications based on specific patterns or signatures in the traffic, which is a standard method used in deep packet inspection. Additionally, an application override policy match can take place when there is a need to override the application identified by the firewall; this process bypasses deeper inspection in favor of a quicker, less secure method, which is part of the application identification process. Therefore, both pattern-based application identification and application override policy match are performed in application identification.

Discussion
cjaceOptions: AB

Yes, you’re correct. The Application Override Policy Match is indeed a part of the application identification process in the packet flow within Palo Alto’s PAN-OS12345. Application Override policies are used when you want to override the application that the firewall has identified2. These policies bypass layer 7 processing and threat inspection and instead use less secure stateful layer 4 inspection2. They prevent the firewall from performing layer 7 application identification and layer 7 threat inspection and prevention2. Therefore, the correct answers are A. pattern based application identification and B. application override policy match.

cjaceOptions: AC

During the packet flow process, the two processes that are performed in application identification are: A. Pattern based application identification This process involves identifying applications based on patterns or signatures in the traffic. It’s a common method used in deep packet inspection. C. Session application identified Once the application is identified based on patterns, the session is then labeled with the identified application. This allows the firewall to apply the appropriate policies for that specific application. So, the correct answers are A and C

noloxOptions: AB

Based on link correct