Which of the following would allow the security administrator to test the lack of security controls for those applications with the least impact to the system?