exam questions

Exam PCNSA All Questions

View all questions & answers for the PCNSA exam

Exam PCNSA topic 1 question 159 discussion

Actual exam question from Palo Alto Networks's PCNSA
Question #: 159
Topic #: 1
[All PCNSA Questions]

During the packet flow process, which two processes are performed in application identification? (Choose two.)

  • A. pattern based application identification
  • B. application override policy match
  • C. session application identified
  • D. application changed from content inspection
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️
Reference:
http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NasimDonya
2 weeks, 2 days ago
Selected Answer: AB
A and B are correct: he firewall first performs an application-override policy lookup to see if there is a rule match. If there is, the application is known and content inspection is skipped for this session . If there is no application-override rule, then application signatures are used to identify the application. The firewall uses protocol decoding in the content inspection stage to determine if an application changes from one application to another .
upvoted 1 times
...
cjace
1 month, 3 weeks ago
Yes, you’re correct. The Application Override Policy Match is indeed a part of the application identification process in the packet flow within Palo Alto’s PAN-OS12345. Application Override policies are used when you want to override the application that the firewall has identified2. These policies bypass layer 7 processing and threat inspection and instead use less secure stateful layer 4 inspection2. They prevent the firewall from performing layer 7 application identification and layer 7 threat inspection and prevention2. Therefore, the correct answers are A. pattern based application identification and B. application override policy match.
upvoted 2 times
...
cjace
1 month, 3 weeks ago
During the packet flow process, the two processes that are performed in application identification are: A. Pattern based application identification This process involves identifying applications based on patterns or signatures in the traffic. It’s a common method used in deep packet inspection. C. Session application identified Once the application is identified based on patterns, the session is then labeled with the identified application. This allows the firewall to apply the appropriate policies for that specific application. So, the correct answers are A and C
upvoted 1 times
...
nolox
1 year, 3 months ago
Selected Answer: AB
Based on link correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago