As a penetration tester, you've encountered a network segment that consists of IoT devices known to implement UDP-based protocols for their various services. You need to conduct a thorough scan to identify potential vulnerabilities within these services, while minimizing the amount of generated traffic to avoid alerting defensive measures or overwhelming the devices. Which of the following Nmap commands correctly configures a scan to meet these requirements?
nmap -sT --top-ports 100 -T2 target
nmap -sU -p- -T4 target
nmap -sU --top-ports 100 -T2 target
nmap -sU -p 1-65535 -T4 target