Penetration Tests vs. Vulnerability Scans: Understanding the Differences