Exam PCNSE All QuestionsBrowse all questions from this exam
Question 65

During the packet flow process, which two processes are performed in application identification? (Choose two.)

    Correct Answer: A, B

    During the packet flow process, the application identification phase involves multiple steps to determine the nature of the application involved. One of the steps includes pattern-based application identification, which detects applications based on predefined patterns, making it a critical part of application identification. Another essential step is the application override policy match, which allows administrators to manually define rules to identify applications under specific conditions, overriding the default identification mechanisms. These are the two processes performed in application identification, ensuring both automated and manually defined identifications are accounted for.

Discussion
tester12Options: AB

Should be A and B http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

asmaamOptions: AB

Correct ans = AB

RipuOptions: AB

Correct Answer:A,B

hpbdcbOptions: AB

A and B

AbuHussainOptions: AB

Should be A and B

unknidOptions: AB

A+B = Identified by behavioral heuristics

yogininangpalOptions: AB

The obvious answer is AB and a nuanced answer is AC. The packet flow shows clearly AB but really in application detection the decoders are used and the tunneled applications are identified so there is kind of overlap in real application identification process in the packet flow. One thing to remember is do not pick nuanced answers only pick the obvious answers in the exam!!

PakawatOptions: AB

Correct answer are A, B

DimidaOptions: AB

A,B right

YasserSaiedOptions: AB

A & B --- A: Signature Match, B: App Override

AdamabdiOptions: AB

A and B are correct . http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

MarshpillowzOptions: AB

A and B are correct

UFanatOptions: AB

First and second step during application identification: Application override policy match Pattern based application identification

tururu1496Options: AB

Answer: A,B

evdwOptions: AB

Correct Answer: A, B

trashboatOptions: AD

I think this is a bad question, because the PAN-OS Packet Flow Sequence says that during Application Identification, the application session is identified, but it also says pattern-based application identification is used. So really the answer could be A&B or B&D. See both the packet flow diagram, as well as Section 5 ("...the firewall identifies the session application..." https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

aadachOptions: BD

only BD !