Which of the following methods is best suited for identifying network devices and services without generating traffic that could be detected by an attacker?
Deploying an agent on all network devices to report activities
Examining network traffic using a network tap or span port
Using a vulnerability scanner such as Nessus or OpenVAS
Conducting a port scan with a tool like Nmap