**Click the appropriate field below each characteristic to indicate the analysis approach it describes.**

Assumes that for an exploit to be successful all prior steps in the exploit process must also be successful.

- **Deterministic**

Analysis is useful in real time network security analysis in which numerous variables are at play.

- **Probabilistic**

Analysis can only describe the worst case.

- **Deterministic**

Analysis estimates the likelihood that an exploit has been ultimately successful.

- **Probabilistic**

Analysis assumes that port numbers that will be used by an exploit can only be predicted with some degree of confidence.

- **Probabilistic**

Analysis assumes that all of the information to accomplish an exploit is known.

- **Deterministic**

** Exam with this question: 11.2.4 Check your Understanding -- Identify Deterministic and Probabilistic Scenarios**

Please login or Register to submit your answer