A penetration tester is conducting a vulnerability assessment and wants to simulate the perspective of an external attacker with no prior knowledge of the internal network.Which type of scan would be MOST appropriate for this objective?