During a live response to an unauthorized access, a forensics specialist executes a command on
the computer being investigated. Which of the following commands would be used to display the
current network connections on the local computer?
A.
NETSTAT
B.
nmap
C.
netcat
D.
IPCONFIG / IFCONFIG