Evaluation of Two Methods of Automated Adversary Emulation