During the packet flow process, which two processes are performed in application identification? (Choose two.)
pattern based application identification
application override policy match
session application identified
application changed from content inspection
Submit