Watch this video on YouTube
Which of the following scanning techniques is used by an attacker to check whether a machine is vulnerable to UPnP exploits?