Which port are used by Viruses? TCP or UDP?

Answers were Sorted based on User's Feedback



Which port are used by Viruses? TCP or UDP?..

Answer / raj

UDP

Is This Answer Correct ?    28 Yes 4 No

Which port are used by Viruses? TCP or UDP?..

Answer / nagaraj.bhat (raj)

Hi all, for this answer, this is the only possible
explaination i can give... :)

UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.

Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.

This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..

Is This Answer Correct ?    15 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / teja

it is using udp protocal port 137 is using vires

Is This Answer Correct ?    4 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / shahin

Mr Raj... It wud be a great pleasure, if u explain it..????

Is This Answer Correct ?    5 Yes 2 No

Which port are used by Viruses? TCP or UDP?..

Answer / noor

it is using udp protocol port 137 is using virus

Is This Answer Correct ?    2 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / nitin tiwari

hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.

Is This Answer Correct ?    1 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / ameer hussain

UDP

Is This Answer Correct ?    1 Yes 1 No

Which port are used by Viruses? TCP or UDP?..

Answer / anush

tcp

Is This Answer Correct ?    3 Yes 8 No

Post New Answer

More CCNA Interview Questions

How is private ip different from public ip?

0 Answers  


Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client

1 Answers  


Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet

2 Answers  


Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace

2 Answers  


Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  






Explain how many collision domains are in switch?

0 Answers  


Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection

7 Answers   Patni,


Explain the difference between tftp and ftp application layer protocols?

0 Answers  


255.255.255.128/what is the n/w id ,broadcast id and the number of valid host(according to disco rules)

5 Answers   Reliance,


The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions

2 Answers  


What is the default interval for SAP updates? A.) 60 seconds B.) 15 seconds C.) 30 seconds D.) 120 seconds

1 Answers   ACS,


Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree

2 Answers  


Categories