When performing a vulnerability scan on an environment that contains sensitive operational technology, such as an industrial control system, what type of scanning is recommended to minimize potential disruptions?
Active scanning
Full port scanning
Compliance scanning
Passive scanning