An organization requires a detailed inventory of services and operating systems of devices in their internal network without causing significant network disruption. As a cybersecurity analyst, which Nmap command would you use to perform an unobtrusive and in-depth network scan?
nmap -O -T4
nmap -sn
nmap -Pn -T4
nmap -sV -T2