When conducting web application security testing, which feature of the Zed Attack Proxy (ZAP) enables it to effectively find security vulnerabilities?
Reverse engineering of executable code to identify source-level vulnerabilities
Passive network monitoring to intercept and inspect traffic
Asset inventory cataloguing through device fingerprinting
Active scanning by sending modified requests to the application