Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to document which ports are being listened on for the various servers. Which type of tool will the penetration tester most likely use