Answer Posted / nitin tiwari
hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What are the conversion steps of data encapsulation?
Name the different types of networks
What is half duplex and full duplex?
What is DHCP stand for?
Define osi?
Why we use debug command?
What is the difference between bus topology and hub?
What is a digital certificate?
How do we do encryption and authentication in L2TP?
What is the role of the LLC sublayer?
What is BootP?
What is the difference between hub, switch, and router?
What are the disadvantages of symmetric algorithms?
When does network congestion occur?
What is default size of hello packets in ospf?