Answer: To simulate attacks on a system to identify vulnerabilities
Follow us on social media for updates and news!