Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam PCNSE topic 1 question 65 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 65
Topic #: 1
[All PCNSE Questions]

During the packet flow process, which two processes are performed in application identification? (Choose two.)

  • A. Pattern based application identification
  • B. Application override policy match
  • C. Application changed from content inspection
  • D. Session application identified
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
tester12
Highly Voted 4 years, 7 months ago
Should be A and B http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
upvoted 33 times
...
asmaam
Highly Voted 4 years ago
Correct ans = AB
upvoted 9 times
...
Marshpillowz
Most Recent 2 months, 3 weeks ago
Selected Answer: AB
A and B are correct
upvoted 1 times
...
Pakawat
1 year, 9 months ago
Correct answer are A, B
upvoted 2 times
...
UFanat
1 year, 10 months ago
Selected Answer: AB
First and second step during application identification: Application override policy match Pattern based application identification
upvoted 1 times
...
Dimida
2 years ago
Selected Answer: AB
A,B right
upvoted 2 times
...
AbuHussain
2 years ago
Selected Answer: AB
Should be A and B
upvoted 3 times
...
tururu1496
2 years, 1 month ago
Answer: A,B
upvoted 1 times
...
unknid
2 years, 2 months ago
Selected Answer: AB
A+B = Identified by behavioral heuristics
upvoted 3 times
...
YasserSaied
2 years, 10 months ago
A & B --- A: Signature Match, B: App Override
upvoted 2 times
...
yogininangpal
2 years, 11 months ago
The obvious answer is AB and a nuanced answer is AC. The packet flow shows clearly AB but really in application detection the decoders are used and the tunneled applications are identified so there is kind of overlap in real application identification process in the packet flow. One thing to remember is do not pick nuanced answers only pick the obvious answers in the exam!!
upvoted 3 times
...
evdw
2 years, 11 months ago
Correct Answer: A, B
upvoted 1 times
...
trashboat
2 years, 11 months ago
I think this is a bad question, because the PAN-OS Packet Flow Sequence says that during Application Identification, the application session is identified, but it also says pattern-based application identification is used. So really the answer could be A&B or B&D. See both the packet flow diagram, as well as Section 5 ("...the firewall identifies the session application..." https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
upvoted 1 times
...
Adamabdi
3 years ago
A and B are correct . http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309
upvoted 2 times
...
aadach
3 years ago
only BD !
upvoted 1 times
...
hpbdcb
3 years, 4 months ago
A and B
upvoted 4 times
...
Ripu
3 years, 10 months ago
Correct Answer:A,B
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...