Watch this video on YouTube
Which of the following techniques will be helpful to identify all the active devices in a network protected by a firewall?