During a vulnerability scan, you need to ensure that the scanning activities are as discreet as possible. Which protocol would be preferable for stealth scanning to reduce the chance of detection by network security devices?
TCP connect scan
User Datagram Protocol (UDP) scan
Transmission Control Protocol (TCP) scan
TCP SYN (half-open) scan