Penetration testing reveals computer system weaknesses and seeks to exploit them. However, implementing such a test is costly and impractical due to the extensive human hours required. As a result, completing the test and generating a report typically takes two weeks.