A company is preparing to deploy a new web application that will process sensitive data. Before going live, the IT security team is planning to assess the potential risks associated with the application. Which assessment technique will specifically simulate an attacker's actions to find vulnerabilities that could be exploited in the new web application?
Posture assessment
Penetration testing
Threat assessment
Vulnerability assessment