A network administrator suspects that an unauthorized device is connected to the corporate network. The device is suspected of broadcasting a large amount of traffic, potentially a broadcast storm. Which command should the administrator use to list all active connections and listening ports on servers to identify any unusual activity?
netstat
route
arp
ping