A cybersecurity analyst is configuring a vulnerability scan for a highly utilized network containing critical real-time processing systems. Given the need to maintain system performance and limit disruptions, which of the following would be the MOST appropriate configuration for the scheduled vulnerability scan?
Conduct a comprehensive scan once a year only
Schedule the scan to occur during peak business hours
Opt not to perform vulnerability scans to avoid any potential disruption
Scan continuously at a slow pace to spread the load
Perform the scan during off-peak hours