Your team is preparing to conduct a vulnerability assessment on a critical system during peak business hours with the requirement to minimize any potential disruptions to network traffic. Which type of vulnerability scanning should they opt for?
Passive scanning
Active scanning with non-credentialed checks
Dynamic scanning during a non-critical window
Credentialed active scanning