Click the appropriate field below each characteristic to indicate the analysis approach it describes.
Assumes that for an exploit to be successful all prior steps in the exploit process must also be successful.
- Deterministic
Analysis is useful in real time network security analysis in which numerous variables are at play.
- Probabilistic
Analysis can only describe the worst case.
- Deterministic
Analysis estimates the likelihood that an exploit has been ultimately successful.
- Probabilistic
Analysis assumes that port numbers that will be used by an exploit can only be predicted with some degree of confidence.
- Probabilistic
Analysis assumes that all of the information to accomplish an exploit is known.
- Deterministic
Exam with this question: 11.2.4 Check your Understanding -- Identify Deterministic and Probabilistic Scenarios
Please login or Register to submit your answer