Which port are used by Viruses? TCP or UDP?
Answers were Sorted based on User's Feedback
Hi all, for this answer, this is the only possible
explaination i can give... :)
UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.
Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.
This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..
| Is This Answer Correct ? | 15 Yes | 0 No |
hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.
| Is This Answer Correct ? | 1 Yes | 0 No |
LAN stands for which of the following? A.) Local Area Network B.) Local Arena Network C.) Local Area News D.) Logical Area Network
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
When you cords an IP address on a place router which command stale the IP processing on the interface? A. ip enable B. network ip-address C. ip address ip-address subnet mask D. the exit command from the enabled configuration E. copy running-configuration to startup-configuration
A network is vow congested currently all the devices are connected through a hub. Which would best decrease congestion on this network? A. add a second hub B. replace the hub with a router C. replace the hub with a switch D. replace the hub with a repeater
What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?
What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait. A.) Full-Duplex B.) Dual-Duplex C.) Half-Duplex D.) Latex E.) Quarter-Duplex F.) Suplex
What is the maximum value of administrative you can use?
What is default size of hello packets in ospf?
What is L2 Link and its significance regarding IP addressing.
When does network congestion occurs?
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255