How does a penetration test differ from an automated vulnerability scan?