Watch this video on YouTube
During a security review, what is the primary method to check if sensitive data is being exposed through web applications?