Difficulty: Easy
Correct Answer: Netstat
Explanation:
Introduction / Context:
Effective troubleshooting requires visibility into which processes are bound to which ports, what connections are established, and how many packets/bytes interfaces have handled. A single utility on most operating systems offers a broad view of sockets, routes, and interface statistics—making it the go-to “all-purpose” TCP/IP diagnostic tool.
Given Data / Assumptions:
Concept / Approach:
Netstat reports per-protocol statistics (TCP/UDP), established and listening ports, route tables, and interface counters. By contrast, PING checks basic reachability/latency only; NBTSTAT focuses on NetBIOS-over-TCP/IP status; Hostname merely prints the local host name; and Traceroute maps path hops but does not show local socket/port usage. Therefore, Netstat is the broadest single tool for local TCP/IP stack inspection.
Step-by-Step Solution:
Verification / Alternative check:
Examples: netstat -an to list sockets; netstat -r for routes; netstat -i for interface stats. Modern equivalents like ss (Linux) maintain similar functionality, confirming the concept.
Why Other Options Are Wrong:
Common Pitfalls:
Trying to diagnose port conflicts or listen states with PING/Traceroute; overlooking firewall states when reading Netstat outputs—combine with other tools as needed.
Final Answer:
Netstat
Discussion & Comments