Prev Next Question 35/91 - PCNSE.v2018-11-18

During the packet flow process, which two processes are performed in application identification? (Choose two.)

Comments (The most recent comments are at the top.)

- Jan 01, 2019

The correct answer is CD, not BC.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

- Dec 03, 2018

The correct answer is BD not BC

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (91q)
1 commentQuestion 1: An administrator wants multiple web servers in the DMZ to re...
Question 2: An administrator has users accessing network resources throu...
3 commentQuestion 3: A customer has an application that is being identified as un...
Question 4: An administrator wants a new Palo Alto Networks NGFW to obta...
Question 5: What is exchanged through the HA2 link?...
Question 6: A Palo Alto Networks NGFW just submitted a file to WildFire ...
Question 7: Refer to the exhibit. (Exhibit) Which will be the egress int...
Question 8: An administrator has configured a QoS policy rule and a QoS ...
Question 9: View the GlobalProtect configuration screen capture. What is...
Question 10: Which two methods can be used to verify firewall connectivit...
Question 11: Which option would an administrator choose to define the cer...
Question 12: Which method does an administrator use to integrate all non-...
2 commentQuestion 13: Which option enables a Palo Alto Networks NGFW administrator...
Question 14: If an administrator wants to decrypt SMTP traffic and posses...
Question 15: Which is the maximum number of samples that can be submitted...
Question 16: Which two subscriptions are available when configuring panor...
1 commentQuestion 17: An administrator has configured the Palo Alto Networks NGFW'...
Question 18: In High Availability, which information is transferred via t...
Question 19: Which three options are supported in HA Lite? (Choose three....
Question 20: In which two types of deployment is active/active HA configu...
Question 21: Which four NGFW multi-factor authentication factors are supp...
2 commentQuestion 22: An administrator has left a firewall to use the default port...
Question 23: Which Captive Portal mode must be configured to support MFA ...
Question 24: Which three authentication factors does PAN-OS® software sup...
1 commentQuestion 25: A client is concerned about resource exhaustion because of d...
3 commentQuestion 26: What are the differences between using a service versus usin...
Question 27: Which GlobalProtect Client connect method requires the distr...
Question 28: An administrator is using Panorama and multiple Palo Alto Ne...
Question 29: The firewall determines if a packet is the first packet of a...
2 commentQuestion 30: An administrator creates an SSL decryption rule decrypting t...
Question 31: Which logs enable a firewall administrator to determine whet...
Question 32: Where can an administrator see both the management plane and...
Question 33: A session in the Traffic log is reporting the application as...
Question 34: Which two features does PAN-OS® software use to identify app...
2 commentQuestion 35: During the packet flow process, which two processes are perf...
Question 36: Which CLI command can be used to export the tcpdump capture?...
Question 37: An administrator logs in to the Palo Alto Networks NGFW and ...
Question 38: Which Panorama administrator types require the configuration...
Question 39: When configuring the firewall for packet capture, what are t...
1 commentQuestion 40: What are two benefits of nested device groups in Panorama? (...
Question 41: A customer wants to combine multiple Ethernet interfaces int...
Question 42: A company wants to install a PA-3060 firewall between two co...
Question 43: Which two settings can be configured only locally on the fir...
3 commentQuestion 44: The firewall identifies a popular application as an unknown-...
1 commentQuestion 45: Based on the following image, what is the correct path of ro...
1 commentQuestion 46: Which three steps will reduce the CPU utilization on the man...
1 commentQuestion 47: Which three file types can be forwarded to WildFire for anal...
Question 48: A customer wants to set up a site-to-site VPN using tunnel i...
Question 49: The certificate information displayed in the following image...
Question 50: Which feature must you configure to prevent users form accid...
Question 51: Which Palo Alto Networks VM-Series firewall is valid?...
1 commentQuestion 52: Refer to the exhibit. (Exhibit) Which certificates can be us...
1 commentQuestion 53: Which data flow describes redistribution of user mappings?...
Question 54: Which event will happen if an administrator uses an Applicat...
Question 55: An administrator needs to optimize traffic to prefer busines...
Question 56: Which Security policy rule will allow an admin to block face...
1 commentQuestion 57: Which three settings are defined within the Templates object...
Question 58: Which prerequisite must be satisfied before creating an SSH ...
Question 59: Which log file can be used to identify SSL decryption failur...
1 commentQuestion 60: Which operation will impact performance of the management pl...
Question 61: Which DoS protection mechanism detects and prevents session ...
Question 62: Which CLI command enables an administrator to view details a...
Question 63: Which option is part of the content inspection process?...
Question 64: In a virtual router, which object contains all potential rou...
Question 65: How would an administrator monitor/capture traffic on the ma...
2 commentQuestion 66: An administrator wants to upgrade an NGFW from PAN-OS® 7.1.2...
2 commentQuestion 67: If the firewall is configured for credential phishing preven...
2 commentQuestion 68: Which three authentication services can administrator use to...
Question 69: If the firewall has the link monitoring configuration, what ...
Question 70: A client has a sensitive application server in their data ce...
Question 71: A speed/duplex negotiation mismatch is between the Palo Alto...
Question 72: An administrator needs to determine why users on the trust z...
Question 73: Based on the image, what caused the commit warning? (Exhibit...
1 commentQuestion 74: VPN traffic intended for an administrator's Palo Alto Networ...
Question 75: Which Zone Pair and Rule Type will allow a successful connec...
Question 76: Which feature can provide NGFWs with User-ID mapping informa...
2 commentQuestion 77: A web server is hosted in the DMZ, and the server is configu...
Question 78: For which two reasons would a firewall discard a packet as p...
Question 79: Which CLI command enables an administrator to check the CPU ...
Question 80: Which feature can be configured on VM-Series firewalls?...
Question 81: Which User-ID method maps IP addresses to usernames for user...
Question 82: An administrator creates a custom application containing Lay...
Question 83: Which tool provides an administrator the ability to see tren...
Question 84: When backing up and saving configuration files, what is achi...
1 commentQuestion 85: Which protection feature is available only in a Zone Protect...
1 commentQuestion 86: An administrator needs to implement an NGFW between their DM...
Question 87: An administrator just submitted a newly found piece of spywa...
Question 88: Which feature prevents the submission of corporate login inf...
Question 89: Which three user authentication services can be modified to ...
Question 90: Which menu item enables a firewall administrator to see deta...
1 commentQuestion 91: An administrator needs to upgrade a Palo Alto Networks NGFW ...