Which of the following host discovery techniques must Andrew use to perform the given task if he is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network?