When scheduling a vulnerability scan for a critical system that has limited resources and cannot afford the overhead of installed software, which scanning method should be employed?
Dynamic scanning incorporating reverse engineering
Credentialed agent-based scanning
Agentless scanning
Non-credentialed agent-based scanning