A company is preparing to deploy a new web application that will process sensitive data. Before going live, the IT security team is planning to assess the potential risks associated with the application. Which assessment technique will specifically simulate an attacker's actions to find vulnerabilities that could be exploited in the new web application?
Vulnerability assessment
Threat assessment
Posture assessment
Penetration testing