What is the primary purpose of Vulnerability Analysis in the context of CEH - Certified Ethical Hacker?