What are two scenarios where probabilistic security analysis is best suited? (Choose two.)
- when applications that conform to application/networking standards are analyzed
- when random variables create difficulty in knowing with certainty the outcome of any given event
- when each event is the inevitable result of antecedent causes
- when analyzing applications designed to circumvent firewalls
- when analyzing events with the assumption that they follow predefined steps
Explanation: Probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event will occur based on the likelihood that prior events will occur.