Watch this video on YouTube
Which of the following best describes the identification of undocumented software functionality?