A cybersecurity analyst is configuring a vulnerability scan for a highly utilized network containing critical real-time processing systems. Given the need to maintain system performance and limit disruptions, which of the following would be the MOST appropriate configuration for the scheduled vulnerability scan?
Conduct a comprehensive scan once a year only
Scan continuously at a slow pace to spread the load
Schedule the scan to occur during peak business hours
Opt not to perform vulnerability scans to avoid any potential disruption
Perform the scan during off-peak hours