In his line of work, Nate is an ethical hacker.
He wants to view all of his computer's open TCP/IP and UDP ports.
Nathan tries to map open ports to the running process with PID, process name, and path using the netstat command, but he is still unsuccessful.
What command will Nate use to complete the task from the list below?