When conducting web application security testing, which feature of the Zed Attack Proxy (ZAP) enables it to effectively find security vulnerabilities?
Asset inventory cataloguing through device fingerprinting
Passive network monitoring to intercept and inspect traffic
Active scanning by sending modified requests to the application
Reverse engineering of executable code to identify source-level vulnerabilities
|Incident Response and Management
|Reporting and Communication