What are two scenarios where probabilistic security analysis is best suited? (Choose two.)

  • when applications that conform to application/networking standards are analyzed
  • when each event is the inevitable result of antecedent causes
  • when analyzing events with the assumption that they follow predefined steps

Explanation: Probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event will occur based on the likelihood that prior events will occur.