After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?
A. Stealth scanning
B. Xmas scanning
C. FINS scanning
D. Port scanning
Correct Answer:C