A network administrator suspects that a Windows workstation may be communicating with an unknown server, possibly because of malware. Which command-line tool should the administrator run to list all active connections and the ports on which the computer is currently listening?
Running the netstat command (for example, netstat -a or netstat -an) displays every active TCP connection and all TCP/UDP ports on which the computer is listening. This allows the administrator to spot any unexpected or unauthorized connections established by malicious software.
ipconfig only shows local IP configuration information.
ping tests reachability to a remote host but does not list existing connections.
tracert maps the path packets take to a destination, not the workstation's current connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What additional information can the netstat command provide?
Open an interactive chat with Bash
What is the difference between netstat and ipconfig?
Open an interactive chat with Bash
How can malware use open network connections to communicate?