Your team is preparing to conduct a vulnerability assessment on a critical system during peak business hours with the requirement to minimize any potential disruptions to network traffic. Which type of vulnerability scanning should they opt for?
Credentialed active scanning
Passive scanning
Dynamic scanning during a non-critical window
Active scanning with non-credentialed checks