A company’s security team is planning regular vulnerability assessments of its production systems. Management insists that business operations must not be disrupted during these tests.
Which of the following approaches BEST meets this requirement?
A. Run authenticated vulnerability scans against production systems during business hours.
B. Conduct penetration tests against production systems once per quarter.
C. Perform vulnerability scans in a staging environment that mirrors production.
D. Schedule uncredentialed vulnerability scans of production systems during off-peak hours.