Question:
Which command will allow Daphne to do in this situation?
Daphne believes a Trojan horse has infected her system. She wants to examine all active network connections to see which programs are connected and the FQDN to which those programs are connected.