You are using a vulnerability scanner to assess the security posture of your network. Which of the following is the BEST approach to ensure the most comprehensive scan?
Conduct a passive scan to observe traffic patterns without interference.
Run multiple non-credentialed scans to cover all assets.
Perform a credentialed scan using valid login credentials.
Use an agent-based scan to monitor system behavior continuously.