Which one of the following is true about Threat Emulation?