During the packet flow process, which two processes are performed in application identification? (Choose two.)
During the packet flow process, which two processes are performed in application identification? (Choose two.)
During the packet flow process, the application identification phase involves multiple steps to determine the nature of the application involved. One of the steps includes pattern-based application identification, which detects applications based on predefined patterns, making it a critical part of application identification. Another essential step is the application override policy match, which allows administrators to manually define rules to identify applications under specific conditions, overriding the default identification mechanisms. These are the two processes performed in application identification, ensuring both automated and manually defined identifications are accounted for.
Should be A and B http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
Correct ans = AB
Correct Answer:A,B
A and B
Should be A and B
A+B = Identified by behavioral heuristics
The obvious answer is AB and a nuanced answer is AC. The packet flow shows clearly AB but really in application detection the decoders are used and the tunneled applications are identified so there is kind of overlap in real application identification process in the packet flow. One thing to remember is do not pick nuanced answers only pick the obvious answers in the exam!!
Correct answer are A, B
A,B right
A & B --- A: Signature Match, B: App Override
A and B are correct . http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
A and B are correct
First and second step during application identification: Application override policy match Pattern based application identification
Answer: A,B
Correct Answer: A, B
I think this is a bad question, because the PAN-OS Packet Flow Sequence says that during Application Identification, the application session is identified, but it also says pattern-based application identification is used. So really the answer could be A&B or B&D. See both the packet flow diagram, as well as Section 5 ("...the firewall identifies the session application..." https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
only BD !