A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted? a. Credentialed
b. Non-intrusive
c. SYN
d. Port