Which port are used by Viruses? TCP or UDP?

Answers were Sorted based on User's Feedback



Which port are used by Viruses? TCP or UDP?..

Answer / raj

UDP

Is This Answer Correct ?    28 Yes 4 No

Which port are used by Viruses? TCP or UDP?..

Answer / nagaraj.bhat (raj)

Hi all, for this answer, this is the only possible
explaination i can give... :)

UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.

Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.

This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..

Is This Answer Correct ?    15 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / teja

it is using udp protocal port 137 is using vires

Is This Answer Correct ?    4 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / shahin

Mr Raj... It wud be a great pleasure, if u explain it..????

Is This Answer Correct ?    5 Yes 2 No

Which port are used by Viruses? TCP or UDP?..

Answer / noor

it is using udp protocol port 137 is using virus

Is This Answer Correct ?    2 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / nitin tiwari

hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.

Is This Answer Correct ?    1 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / ameer hussain

UDP

Is This Answer Correct ?    1 Yes 1 No

Which port are used by Viruses? TCP or UDP?..

Answer / anush

tcp

Is This Answer Correct ?    3 Yes 8 No

Post New Answer

More CCNA Interview Questions

what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?

1 Answers  


Which command we use for ping in ipv6?

0 Answers  


What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication

1 Answers  


How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode

3 Answers   Cisco, HCL,


MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation

3 Answers  






Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link

1 Answers  


Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables

1 Answers  


which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance

9 Answers   HCL,


Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth

1 Answers  


Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp

4 Answers  


Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A. 172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to 172.37.2.63 E. 172.37.2.55 to 172.37.2.126

1 Answers  


Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. In order for two ends of virtual circuits to communicate using Frame Relay, their network addresses must be mapped to DLCIs.

2 Answers   Wipro,


Categories