Click the appropriate field below each characteristic to indicate the analysis approach it describes.

IT Questions BankCategory: Network DefenseClick the appropriate field below each characteristic to indicate the analysis approach it describes.

Click the appropriate field below each characteristic to indicate the analysis approach it describes.

Assumes that for an exploit to be successful all prior steps in the exploit process must also be successful.
- Deterministic

Analysis is useful in real time network security analysis in which numerous variables are at play.
- Probabilistic

Analysis can only describe the worst case.
- Deterministic

Analysis estimates the likelihood that an exploit has been ultimately successful.
- Probabilistic

Analysis assumes that port numbers that will be used by an exploit can only be predicted with some degree of confidence.
- Probabilistic

Analysis assumes that all of the information to accomplish an exploit is known.
- Deterministic

Exam with this question: 11.2.4 Check your Understanding -- Identify Deterministic and Probabilistic Scenarios

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments