Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PCNSC Topic 2 Question 68 Discussion

Actual exam question for Palo Alto Networks's PCNSC exam
Question #: 68
Topic #: 2
[All PCNSC Questions]

During the packet flow process, which two processes are performed in application identification? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: B, D

Contribute your Thoughts:

William
11 months ago
Haha, I love how we're all just guessing and trying to sound like we know what we're talking about. Someone should really create a 'Certification Exam Candidate Simulator' app.
upvoted 0 times
...
King
11 months ago
Yeah, I'm with you on that. A and D don't really seem to be part of the identification process itself. I think B and C are the clear winners here.
upvoted 0 times
...
William
11 months ago
I agree with you on B and C, but I'm not convinced about A) and D). Aren't those related to the policy side of things rather than the actual identification process?
upvoted 0 times
Lacey
10 months ago
Thanks for clearing that up. It definitely helps to understand the different steps involved in the process.
upvoted 0 times
...
Lawrence
10 months ago
Exactly. It's a two-step process where B) and C) determine the application and then A) and D) enforce policies based on that identification.
upvoted 0 times
...
Marguerita
10 months ago
That makes sense. So, B) and C) are the ones directly involved in identifying the application, while A) and D) handle what happens next.
upvoted 0 times
...
Tyra
10 months ago
I see what you're saying, but from my understanding, A) and D) are more about how the identified application is handled rather than the actual identification itself.
upvoted 0 times
...
Allene
10 months ago
I'm really not sure about that. I think A) and D) might play a role in the identification process as well.
upvoted 0 times
...
Tammy
10 months ago
C) pattern based application identification
upvoted 0 times
...
Isaac
10 months ago
B) session application identified
upvoted 0 times
...
...
Cristina
11 months ago
Hmm, this question seems a bit tricky. I'm not 100% sure about the application identification process, but I think B) session application identified and C) pattern based application identification are the correct answers.
upvoted 0 times
...

Save Cancel