Which port are used by Viruses? TCP or UDP?
Answers were Sorted based on User's Feedback
Hi all, for this answer, this is the only possible
explaination i can give... :)
UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.
Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.
This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..
Is This Answer Correct ? | 15 Yes | 0 No |
hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.
Is This Answer Correct ? | 1 Yes | 0 No |
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Which command we use for ping in ipv6?
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp
Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A. 172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to 172.37.2.63 E. 172.37.2.55 to 172.37.2.126
Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. In order for two ends of virtual circuits to communicate using Frame Relay, their network addresses must be mapped to DLCIs.