When seeking to test a web application for security weaknesses, why would an analyst choose to utilize the Spider feature of the Zed Attack Proxy (ZAP)?
It passively analyzes network traffic to identify potential vulnerabilities without sending any traffic to the application.
It monitors the application for change over time to establish a security baseline.
It automatically navigates through links in the application to map out the content and structure for further testing.
It aggressively probes the application with various inputs (fuzzing) to try and trigger an unhandled error or security flaw.