Now you may understand why you need a statistics course. As aforensics analyst, how would you use statistical flow analysis toidentify a compromised host? How about to confirm or disprove dataleakage? How would it be used to create a profile of an individual?Can statistical flow analysis be used to prevent either a hostbecoming compromised or data being leaked?