1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
2 years ago
5

One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular

ports or display all active connections and ports on which a computer is listening and, depending on the OS, can also include the total number of bytes of traffic, domain names, and IP addresses (local and foreign). Name at least two potential uses of this command, making sure at least one use is related to secure administration principles.
Computers and Technology
1 answer:
labwork [276]2 years ago
3 0

An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

<h3>What protocol does the netstat command use?</h3>

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

<h3>What is netstat used for?</h3>

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

Learn more about troubleshoot from

brainly.com/question/9572941

#SPJ1

You might be interested in
An email address is made up of all of the following parts except
Lesechka [4]

Answer:

D: HTTP

Explanation:

When we talk about the email address and the different parts, we can mention for example:

Firstly the username, always an email address starts with a username, next we must use the symbol @, for example:

peter @

michael @

we can add numbers or some characters

henry_98 @

The last part is the domain name, this is the email's company.

5 0
3 years ago
Read 2 more answers
All animations on the world wide web are flash animations
natima [27]

Not every animation on the web is Flash but currently the majority is. There exists simple GIF based animations as well as other technologies for animation such as Silverlight and HTML5. Most believe HTML5 will eventually replace Flash.

6 0
3 years ago
Read 2 more answers
IMPORTANT!!<br><br> How can you get real answer keys for edmentum (plato) courses as a student?
dimulka [17.4K]

Answer:

Looking up the answer on google works but in my experience if you put the whole question onto brainly then look for the one with the best stars and most then the answer will be correct, thats how i have 100% on all my assingments, sorry if this isnt the answer you wanted but it helps

Explanation:

4 0
3 years ago
Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order
cricket20 [7]

Answer:

Select the data to sort

Explanation:

4 0
3 years ago
On a printed circuit board, electronic components will be mounted from the
Likurg_2 [28]
On a printed circuit board, electronic parts will be mounted from the substrate side of the board. The leads jab through the substrate and the copper sheeting that has been carved. The leads are then soldered to the copper.

I hope the answer will help you. 
3 0
3 years ago
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?
    10·2 answers
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • What is a mortgage?
    8·2 answers
  • Unless grunkle stan pines is mistaken, there is a family of deer’s in his garden
    6·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • Speeding is one of the most prevalent factors contributing to traffic crashes.
    12·1 answer
  • 2 ways to make your computer work faster ( please help asap )
    6·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!