The netcat command can be used to __________.

A) test and destroy fraudulent data.
B) troubleshoot destination connections from source computer.
C) test connectivity and send data across network connections.
D) port a series of devices.