determining the feasibility and the potential consequences of a successful attack
detecting potential weaknesses in systemsAnswer:
Explanation: