While cоnducting а penetrаtiоn test, Bоb uses а network mapping tool that actively sends connection requests to multiple points of possible communication on a target system. Alice explains that by checking each of these points to see if they're open, closed, or filtered, Bob can identify potential entryways for further exploitation. What is the term used for these communication endpoints that this type of scan investigates?