During a live response to an unauthorized access, a forensics specialist executes a command on
the computer being investigated. Which of the following commands would be used to display the
current network connections on the local computer?
A.
NETSTAT
B.
IPCONFIG / IFCONFIG
C.
nmap
D.
netcat