You are a security analyst at a university. The university uses Linux-based tools when systems are discovered to be or suspected to be compromised.
Would you use Kali Linux for penetration testing? Why or why not?