When conducting web application security testing, which feature of the Zed Attack Proxy (ZAP) enables it to effectively find security vulnerabilities?
Active scanning by sending modified requests to the application
Asset inventory cataloguing through device fingerprinting
Passive network monitoring to intercept and inspect traffic
Reverse engineering of executable code to identify source-level vulnerabilities