A penetration tester is attempting to scan an internal corporate network from the internet without
alerting the border sensor. Which is the most efficient technique should the tester consider using?
A.
Spoofing an IP address
B.
Tunneling scan over SSH
C.
Tunneling over high port numbers
D.
Scanning using fragmented IP packets