Penetration testing is distinct from vulnerability scanning primarily because penetration testing:
A . leverages credentialed scanning to obtain persistence
B . involves multiple active exploitation techniques
C . relies exclusively on passive exploitation attempts for pivoting
D . relies on misconfiguration of security controls
Answer: B