Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic?
a. TCP connect scanning technique
b. FIN scanning technique
c. Stealth scanning technique