When conducting a vulnerability scan, what should a penetration tester implement to reduce the risk of overloading the target system and potentially avoiding detection by the target's intrusion detection systems?
Increasing the scan's speed to maximum
Implementing query throttling
Disabling all scan randomization features
Scanning during peak business hours