During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?
Credentialed scan
Non-credentialed scan
Stealth scan
TCP connect scan