A software firm hires a security consultant to test its newly built platform’s vulnerability to hackers. As part of testing, the consultant deliberately tries to access systems without authorization, and discovers some security breach vulnerabilities. The results of the test enable the firm to fix the potential breaches before the platform’s launch and boost its resistance against real-time hacking. Which type of cyber defense activity is described in this scenario?