The result of a simulated attack on a system, correlated to the vulnerabilities in that system, can produce a much more complete picture of cyber risk. Weaknesses discovered by automated recon can be tested to determine if the weakness is exploitable and what is at risk if it’s exploited.