Your team is preparing to conduct a vulnerability assessment on a critical system during peak business hours with the requirement to minimize any potential disruptions to network traffic. Which type of vulnerability scanning should they opt for?
Active scanning with non-credentialed checks
Credentialed active scanning
Dynamic scanning during a non-critical window
Passive scanning