Which port are used by Viruses? TCP or UDP?

Answers were Sorted based on User's Feedback



Which port are used by Viruses? TCP or UDP?..

Answer / raj

UDP

Is This Answer Correct ?    28 Yes 4 No

Which port are used by Viruses? TCP or UDP?..

Answer / nagaraj.bhat (raj)

Hi all, for this answer, this is the only possible
explaination i can give... :)

UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.

Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.

This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..

Is This Answer Correct ?    15 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / teja

it is using udp protocal port 137 is using vires

Is This Answer Correct ?    4 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / shahin

Mr Raj... It wud be a great pleasure, if u explain it..????

Is This Answer Correct ?    5 Yes 2 No

Which port are used by Viruses? TCP or UDP?..

Answer / noor

it is using udp protocol port 137 is using virus

Is This Answer Correct ?    2 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / nitin tiwari

hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.

Is This Answer Correct ?    1 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / ameer hussain

UDP

Is This Answer Correct ?    1 Yes 1 No

Which port are used by Viruses? TCP or UDP?..

Answer / anush

tcp

Is This Answer Correct ?    3 Yes 8 No

Post New Answer

More CCNA Interview Questions

What is the difference between simple authentication and md5?

0 Answers  


Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100

3 Answers  


Define ios?

0 Answers  


Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup

2 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  






Can you explain PPP protocol?

0 Answers   CCIE,


Which command will enable CHAP authentication on a serial interface that is using PPP? A.) encapsulation chap B.) ppp chap C.) ppp enable chap D.) ppp encapsulation chap E.) ppp authentication chap F.) ppp chap enable

2 Answers  


What will you do if ur IOS in coorrupt/deleted/Wrong Type/No IOS image ?

3 Answers   Allied Group,


If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI

1 Answers  


What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF

5 Answers   HCL,


Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


Categories