Which of the following techniques allows probing firewall rule sets and finding entry points into a targeted system or network?
Distributed checksum clearinghouse
Firewall fingerprinting
Network enumeration
Packet crafting
Submit