Your company's network includes a range of devices, including a production database server known for its fragility in terms of performance when handling intensive tasks. Your task is to schedule a vulnerability scan. Which approach balances the need to perform the vulnerability scan while minimizing the risk of system performance degradation?
Conduct agentless, non-credentialed scans during peak business operations
Rely solely on vulnerability reports from the last quarter without initiating a new scan
Perform a full scan during business hours with a high sensitivity level
Schedule a scan during off-hours and utilize a low sensitivity level