CompTIA CySA+ CS0-003 Practice Question
When seeking to test a web application for security weaknesses, why would an analyst choose to utilize the Spider feature of the Zed Attack Proxy (ZAP)?
It monitors the application for change over time to establish a security baseline.
It aggressively probes the application with various inputs (fuzzing) to try and trigger an unhandled error or security flaw.
It passively analyzes network traffic to identify potential vulnerabilities without sending any traffic to the application.
It automatically navigates through links in the application to map out the content and structure for further testing.