Which port are used by Viruses? TCP or UDP?
Answers were Sorted based on User's Feedback
Hi all, for this answer, this is the only possible
explaination i can give... :)
UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.
Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.
This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..
| Is This Answer Correct ? | 15 Yes | 0 No |
hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.
| Is This Answer Correct ? | 1 Yes | 0 No |
A router blocks ___________ Broadcasts Unicasts All packets Nothing
What is the difference between DTE & DCE???
what is nat.types of nat
What command displays only OSPF routes?
Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address? A.) 0000 B.) 1 C.) 3456 D.) 1ace E.) 0000.0c12.3456 F.) 1aceb0b
Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.
What is CRC and which layer it use?
Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.
Layer 1 and Layer 2 devices must forward a broadcast. Which of the following devices fall into this category? Gateway Switch Router All of the above.
Can you explain the broader steps of how L2F establishes the tunnel?
In which access- list type you can't do editing?