Answer Posted / nitin tiwari
hi,
mr. Anush there is nitin i am confused about your answer
can u explain how this port is used by viruses.if u know
briefly then pls told me because i have to need the answer.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Explain what is 5-4-3 rule?
Can you explain encapsulating, carrier and passenger protocol?
What is default size of hello packets in ospf?
What is the difference between half duplex and full duplex?
What is the difference between private ip and public ip?
What is default cost of serial interface in ospf?
What is the role of the LLC sublayer?
In IPSec what is SAD, SPD and SA's?
What are the disadvantages of symmetric algorithms?
What are the netbios and netbeui?
What does the meaning of interface 0/0?
What is the difference between simple authentication and md5?
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
What is the checksum?
What is the maximum value of administrative you can use?