Which port are used by Viruses? TCP or UDP?

Answers were Sorted based on User's Feedback



Which port are used by Viruses? TCP or UDP?..

Answer / raj

UDP

Is This Answer Correct ?    28 Yes 4 No

Which port are used by Viruses? TCP or UDP?..

Answer / nagaraj.bhat (raj)

Hi all, for this answer, this is the only possible
explaination i can give... :)

UDP Port 137 is connectionless and does not guarantee
reliable communication; it’s up to the application that
received the message on Port 137 to process any errors and
verify correct delivery.

Because protocol UDP port 137 was flagged as a virus
(colored red) does not mean that a virus is using port 137,
but that a Trojan or Virus has used this port in the past
to communicate.

This above answer we can consider as one of the example.
Still we have lot many things to explain in this ragards..

Is This Answer Correct ?    15 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / teja

it is using udp protocal port 137 is using vires

Is This Answer Correct ?    4 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / shahin

Mr Raj... It wud be a great pleasure, if u explain it..????

Is This Answer Correct ?    5 Yes 2 No

Which port are used by Viruses? TCP or UDP?..

Answer / noor

it is using udp protocol port 137 is using virus

Is This Answer Correct ?    2 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / nitin tiwari

hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.

Is This Answer Correct ?    1 Yes 0 No

Which port are used by Viruses? TCP or UDP?..

Answer / ameer hussain

UDP

Is This Answer Correct ?    1 Yes 1 No

Which port are used by Viruses? TCP or UDP?..

Answer / anush

tcp

Is This Answer Correct ?    3 Yes 8 No

Post New Answer

More CCNA Interview Questions

What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


What is the function of the Application Layer in networking?

0 Answers  


I am facing one problem in my layer 2 switch I don’t know the problem is on switch side or client side. The problem is some PC (not all) are stop participate in LAN they don’t send or recd. Packet from switch and if I check RJ45 (with LAN tester)from PC side the packet and 8 pin wire is working fine and after that process of LAN tester I plug RJ 45 in PC now PC start recd/ send packets what is the problem I don’t understand even client side no virus found RJ45 is ok and switch has no problem bcoz other PC is working fine Cable (cat 5 ) is also fine bcoz I didn’t crimp again just check in LAN tester and start working fine. Plz any one solve this matter. And after lan tester process pc is working fine and after 2 or 3 hour it again start same problem and again same process lan tester I have used

5 Answers  


Define topology?

0 Answers  


Hi I asking one thing that my company having cisco ip phone with connected to cisco poe switch.But sometime when my agent calling to customer on that time customer voice is break only few 2 to 3 sec.I have already checked my wan link by isp and also lan connection,but this problem is not sorted out so pls help me.

5 Answers   Infotech,






Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet? A. Class B B. Class A C. Class C D. Class D

2 Answers  


What is Data, management, native, default,trunk and access vlan?

1 Answers  


How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain

3 Answers  


Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN

1 Answers  


Explain protocol?

0 Answers  


Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Categories