During an authorized security assessment, the security team at XYZ Corp is tasked with identifying potential vulnerabilities without alerting the target systems. Which of the following options best describes an method that the security team should employ to gather intelligence without raising suspicion?
Engaging in social engineering calls to the employees
Performing passive DNS analysis
Executing a full network scan to map out live hosts
Running an automated crawler on the company's public website