During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?
Run the scan during peak business hours to blend in with regular traffic.
Scan without credentials to reduce the amount of data transferred.
Use an aggressive scanning method to finish the scan more quickly.
Throttle the scan speed to use minimal bandwidth and prevent network congestion.