Olivia is an Ethical Hacker tasked with identifying all the active devices concealed by a restrictive firewall within the IPv4 range of a designated target network. Which of the following host discovery techniques should she employ to fulfill the assigned task?