Permutation scanning involves which of the following?
-using a pseudorandom function
-using information from infected machines
-collecting a list of possibly vulnerable machines
-looking for new vulnerable machines on the local subnet