What type of technique might be used by these offenders to access the Internet without restriction?
As a security professional, what would you infer from this scan?