Vulnerability Scans or Pen Tests: Which Are More Critical for Your Cyber Plan?