A penetration tester has established a foothold inside a network and wants to conduct reconnaissance inside while remaining anonymous. What could they use to best accomplish this?
a) Proxy servers
b) Virtual private networks (VPNs)
c) TOR (The Onion Router) network
d) IP spoofing