What are two scenarios where probabilistic security analysis is best suited? (Choose two.)
- when applications that conform to application/networking standards are analyzed
 - when random variables create difficulty in knowing with certainty the outcome of any given event
 - when each event is the inevitable result of antecedent causes
 - when analyzing applications designed to circumvent firewalls
 - when analyzing events with the assumption that they follow predefined steps
 
Explanation: Probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event will occur based on the likelihood that prior events will occur.