How come find: push “Ctrl + F” in the browser and also fill in everything wording is in the inquiry to uncover that question/answer. If the concern is no here, uncover it in Questions Bank.

You are watching: When would a network designer be concerned with rus?


NOTE: If you have the brand-new question top top this test, please comment Question and also Multiple-Choice perform in kind below this article. Us will upgrade answers for you in the shortest time. Say thanks to you! us truly worth your donation to the website.


Introduction come Networks ( variation 7.00) – Modules 16 – 17: Building and Securing a tiny Network Exam

1. Which ingredient is designed to protect versus unauthorized interactions to and from a computer?

security centerport scannerantimalwareantivirusfirewall

2. I beg your pardon command will block login make the efforts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 make the efforts 2 within 30RouterA(config)# login block-for 30 attempts 2 in ~ 10RouterA(config)# login block-for 2 make the efforts 30 in ~ 10RouterA(config)# login block-for 30 attempts 10 in ~ 2

3. What is the objective of the network security audit function?

to require users to prove who they areto identify which resources a user can accessto save track the the action of a userto provide an obstacle and an answer questions

4. What form of attack may show off the usage of tools such as nslookup and fping?

access attackreconnaissance attackdenial of organization attackworm attack

5. Match each weakness v an example. (Not all options are used.)

6. Match the type of info security hazard to the scenario. (Not all options are used.)
Explanation:After one intruder gains access to a network, usual network threats room as follows:

Information theftIdentity theftData loss or manipulationDisruption that service

Cracking the password for a recognized username is a kind of accessibility attack.


7. Which example of malicious code would be classified together a Trojan horse?

malware that was created to look choose a video gamemalware the requires hands-on user intervention to spread in between systemsmalware that attaches chin to a legitimate program and spreads to other programs once launchedmalware the can automatically spread from one mechanism to one more by exploiting a vulnerability in the target

8. What is the difference between a virus and also a worm?

Viruses self-replicate yet worms do not.Worms self-replicate but viruses carry out not.Worms call for a host paper but viruses do not.Viruses hide in legitimate programs yet worms execute not.

Explanation: Worms are able come self-replicate and also exploit vulnerabilities on computer networks without user participation.


9. Which assault involves a deteriorate of data the occurs between two end points?

denial-of-serviceman-in-the-middle attackextraction of protection parametersusername enumeration

Explanation: hazard actors frequently attempt to access devices over the net through communication protocols. Some of the most well-known remote exploits space as follows:

Man-In-the-middle strike (MITM) – The risk actor gets between devices in the system and also intercepts every one of the data being transmitted. This information could simply be built up or modified for a certain purpose and delivered to its initial destination.Eavesdropping attack – When gadgets are being installed, the hazard actor have the right to intercept data such together security keys that are used by constrained tools to establish communications once they space up and also running.SQL injection (SQLi) – danger actors offers a defect in the Structured questions Language (SQL) application that allows them to have accessibility to modify the data or gain administrative privileges.Routing attack – A hazard actor might either location a rogue routing device on the network or change routing packets to manipulate routers to send every packets to the chosen destination of the threat actor. The danger actor can then drop specific packets, recognized as selective forwarding, or drop all packets, recognized as a sinkhole attack.


10. Which form of assault involves an evil one attempting to conference information about a network to recognize vulnerabilities?

reconnaissanceDoSdictionaryman-in-the-middle

11. Enhance the description to the kind of firewall filtering. (Not all options are used.)

12. What is the function of the network defense authentication function?

to require users to prove who they areto recognize which resources a user can accessto save track that the action of a userto provide challenge and solution questions

Explanation: Authentication, authorization, and accounting are network services collectively known as AAA. Authentication needs users come prove who they are. Authorization determines which resources the user deserve to access. Audit keeps track of the action of the user.


13. I beg your pardon firewall attribute is provided to ensure that packets coming right into a network room legitimate responses to requests initiated from interior hosts?

stateful packet inspectionURL filteringapplication filteringpacket filtering

14. When applied to a router, i beg your pardon command would help mitigate brute-force password attacks against the router?

exec-timeout 30service password-encryptionbanner motd $Max failure logins = 5$login block-for 60 make the efforts 5 in ~ 60

Explanation: The login block-for command to adjust a limit on the maximum variety of failed login attempts allowed within a defined period of time. If this limit is exceeded, no more logins are enabled for the specified period of time. This helps to minimize brute-force password cracking due to the fact that it will considerably increase the quantity of time forced to crack a password. The exec-timeout command specifies how long the session deserve to be idle before the user is disconnected. The service password-encryption command encrypts the passwords in the running configuration. The banner motd command display screens a message to individuals who room logging in to the device.


15. Determine the actions needed come configure a switch for SSH. The answer order does no matter. (Not all alternatives are used.)


Explanation: The login and password cisco regulates are provided with Telnet move configuration, no SSH configuration.


16. What attribute of SSH renders it an ext secure 보다 Telnet for a maker management connection?

confidentiality through IPsecstronger password requirementrandom one-time harbor connectionlogin information and data encryption

Explanation: Secure covering (SSH) is a protocol that provides a secure management connection to a remote device. SSH offers security by providing encryption for both authentication (username and password) and the sent data. Telnet is a protocol that supplies unsecure plaintext transmission. SSH is assigned to TCP port 22 by default. Back this port have the right to be changed in the SSH server configuration, the harbor is not dynamically changed. SSH does not usage IPsec.


17. What is the advantage of using SSH end Telnet?

SSH is less complicated to use.SSH operates faster than Telnet.SSH offers secure communications to accessibility hosts.SSH supports authentication for a connection request.

Explanation: SSH gives a secure an approach for remote accessibility to master by encrypting network traffic in between the SSH customer and remote hosts. Back both Telnet and also SSH request authentication prior to a link is established, Telnet does not assistance encryption of login credentials.


18. What is the duty of one IPS?

detecting and also blocking of assaults in real timeconnecting an international threat details to Cisco network defense devicesauthenticating and validating trafficfiltering of nefarious websites

Explanation: one intrusion prevention system (IPS) offers real-time detection and blocking the attacks.


19. A user is redesigning a network because that a tiny company and wants to ensure defense at a reasonable price. The user deploys a new application-aware firewall v intrusion detection ability on the ISP connection. The user installs a second firewall to different the agency network from the public network. Additionally, the user installs one IPS ~ above the inner network of the company. What approach is the user implementing?

attack basedrisk basedstructuredlayered

Explanation: Using different defenses at assorted points the the network create a layered approach.


20. What is an accurate description the redundancy?

configuring a router through a finish MAC deal with database to ensure that all frames can be forwarded come the exactly destinationconfiguring a move with appropriate security to ensure that all traffic forwarded through an user interface is filtereddesigning a network to usage multiple virtual tools to ensure the all traffic uses the best path v the internetworkdesigning a network to usage multiple paths between switches to ensure there is no single point of failure

Explanation: Redundancy attempts to remove any solitary point of fail in a network by using multiple physical cabled paths between switches in the network.


21. A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network solutions is the network administrator trying come accommodate? (Choose two.)

voicevideoinstant messagingFTPSNMP

22. What is the objective of a tiny company using a protocol analyzer utility to catch network web traffic on the network segments wherein the agency is considering a network upgrade?

to determine the resource and location of neighborhood network trafficto record the Internet connection bandwidth requirementto document and analyze network traffic demands on each network segmentto develop a baseline for security analysis after the network is upgraded

Explanation: critical prerequisite for considering network expansion is to know the kind and quantity of traffic that is cross the network as well as the present traffic flow. By utilizing a protocol analyzer in every network segment, the network administrator can paper and analyze the network web traffic pattern for each segment, which i do not care the base in determining the needs and means of the network growth.


23. Refer to the exhibit. One administrator is testing connectivity to a remote machine with the IP address 10.1.1.1. What go the output of this command indicate?

*

Connectivity come the remote maker was successful.A router follow me the course did not have a route to the destination.A ping packet is being blocked by a security an equipment along the path.The connection timed the end while wait for a answer from the far device.

Explanation: In the calculation of the ping command, an exclamation note (!) indicates a solution was properly received, a duration (.) shows that the connection timed the end while waiting for a reply, and also the letter “U” shows that a router follow me the course did not have actually a path to the destination and also sent one ICMP destination unreachable message earlier to the source.


24. Which an approach is provided to send a ping blog post specifying the source address because that the ping?

Issue the ping command indigenous within user interface configuration mode.Issue the ping command there is no specifying a destination IP address.Issue the ping command without expanded commands.Issue the ping command after ~ shutting under un-needed interfaces.

Explanation: through issuing the ping command without a location IP attend to in privileged EXEC mode, the Cisco IOS enters prolonged ping mode. This permits the user come implement extended regulates which include source IP address.​


25. A network engineer is analyzing reports native a recently performed network baseline. Which instance would depict a feasible latency issue?

a change in the bandwidth according to the display interfaces outputa next-hop timeout native a traceroutean rise in host-to-host ping response timesa readjust in the lot of ram according to the present version output

Explanation: While analyzing historical reports an administrator deserve to compare host-to-host timers native the ping command and also depict feasible latency issues.​


26. Which statement is true around Cisco IOS ping indicators?​

‘!’ shows that the ping to be unsuccessful and also that the maker may have issues finding a DNS server.‘U’ may suggest that a router along the path did no contain a path to the destination deal with and the the ping to be unsuccessful.‘.’ shows that the ping to be successful yet the solution time was much longer than normal.A mix of ‘.’ and ‘!’ indicates that a router follow me the route did not have actually a path to the destination resolve and responded with an ICMP unreachable message.​

Explanation: The most typical indicators the a ping issued indigenous the Cisco IOS are “!”, “.”, and also “U”. The “!” shows that the ping perfect successfully, verifying connectivity at Layer 3. The “.” may indicate that a connectivity problem, routing problem, or device security worry exists follow me the path and also that one ICMP location unreachable post was not provided. The “U” shows that a router follow me the path may not have had a route to the location address, and also that it responded v an ICMP unreachable message.


27. A user reports a lack of network connectivity. The technician takes regulate of the user an equipment and attempts come ping other computer systems on the network and also these pings fail. The technician pings the default gateway and that also fails. What can be identified for certain by the results of this tests?

The NIC in the pc is bad.The TCP/IP protocol is no enabled.The router that is attached come the exact same network together the workstation is down.Nothing can be determined for certain at this point.

Explanation: In networks today, a failed ping can mean that the other gadgets on the network are blocking pings. More investigation such as checking network connectivity indigenous other gadgets on the exact same network is warranted.


28. A network technician concerns the C:> tracert -6 www.cisco.com command top top a home windows PC. What is the objective of the -6 command option?

It pressures the map to usage IPv6.It limits the map to only 6 hops.It sets a 6 milliseconds timeout for each replay.It sends 6 probes within each TTL time period.

29. Why would a network administrator usage the tracert utility?

to recognize the energetic TCP relationships on a PCto check information about a DNS name in the DNS serverto identify where a packet was shed or delayed on a networkto display screen the IP address, default gateway, and DNS server attend to for a PC

Explanation: The tracert energy is supplied to determine the path a packet bring away from resource to destination. Tracert is commonly used as soon as packets room dropped or not getting to a particular destination.


30. A ping stops working when performed from router R1 to directly connected router R2. The network administrator climate proceeds to concern the display cdp neighbors command. Why would the network administrator worry this command if the ping failed in between the two routers?

The network administrator doubt a virus since the ping command did no work.The network administrator desires to verify great 2 connectivity.The network administrator desires to verify the IP deal with configured top top router R2.The network administrator desires to recognize if connectivity deserve to be created from a non-directly linked network.

Explanation: The show cdp neighbors command have the right to be offered to prove that Layer 1 and Layer 2 connectivity exists in between two Cisco devices. For example, if two tools have duplicate IP addresses, a ping between the tools will fail, yet the output of show cdp neighbors will be successful. The show cdp neighbors detail could be supplied to verify the IP deal with of the directly connected machine in instance the same IP address is assigned to the 2 routers.


31. A network technician is troubleshooting connectivity issues amongst interconnected Cisco routers and switches. I beg your pardon command need to the engineer usage to discover the IP attend to information, organize name, and IOS version of neighboring network devices?

show versionshow ip routeshow interfacesshow cdp neighbors detail

Explanation: The show cdp neighbors detail command reveals much information around neighboring Cisco devices, consisting of the IP address, the capabilities, organize name, and IOS version. The show interfaces and show version commands display screen information about the local device.


32. What information around a Cisco router deserve to be showed using the display version command?

the routing protocol variation that is enabledthe worth of the configuration registerthe operational status of serial interfacesthe governmental distance provided to with networks

Explanation: The value of the construction register can be confirmed with the show version command.


33. Which command should be used on a Cisco router or switch to allow log messages to be shown on remotely connected sessions making use of Telnet or SSH?

debug alllogging synchronousshow running-config​terminal monitor

34. I m sorry command have the right to an administrator worry on a Cisco router come send debug messages to the vty lines?

terminal monitorlogging consolelogging bufferedlogging synchronous

Explanation: Debug messages, like various other IOS log messages, are sent to the console line by default. Sending out these messages to the terminal lines requires the terminal monitor command.


35. By adhering to a structured troubleshooting approach, a network administrator figured out a network issue after a conversation with the user. What is the next step that the administrator have to take?

Verify full system functionality.Test the concept to recognize cause.Establish a theory of probable causes.Establish a setup of action to fix the issue.

Explanation: A structured network troubleshooting technique should encompass these actions in sequence:

Identify the problem.Establish a theory of probable causes.Test the theory to recognize cause.Establish a arrangement of action to solve the issue.Verify complete system functionality and also implement preventative measures.Document findings, actions, and also outcomes.


36. Users are complaining the they are unable come browse certain websites ~ above the Internet. An administrator can efficiently ping a net server via that IP address, however cannot browser to the domain surname of the website. Which troubleshooting tool would be most beneficial in determining where the difficulty is?

netstattracertnslookupipconfig

Explanation: The nslookup command deserve to be supplied to look increase information about a particular DNS name in the DNS server. The information has the IP deal with of the DNS server gift used and the IP attend to associated with the mentioned DNS name. This command can help verify the DNS the is used and also if the domain name to IP deal with resolution works.


37. One employee complains that a Windows pc cannot attach to the Internet. A network technician concerns the ipconfig command top top the PC and also is displayed an IP address of 169.254.10.3. Which 2 conclusions have the right to be drawn? (Choose two.)

The pc cannot call a DHCP server.The DNS server address is misconfigured.The default gateway address is not configured.The pc is configured to attain an IP deal with automatically.The enterprise network is misconfigured because that dynamic routing.

38. Describe the exhibit. Organize H3 is having trouble communicating with organize H1. The network administrator suspects a trouble exists v the H3 workstation and also wants come prove that there is no problem with the R2 configuration. What tool could the network administrator use on router R2 come prove that interaction exists to host H1 native the interface on R2, i m sorry is the interface that H3 uses when interacting with far networks?

*

tracerouteshow cdp neighborsTelnetan expanded ping
*

Connectivity in between H1 and also H3 is fine.H3 is not connected properly to the network.Something is causing interference in between H1 and also R1.Performance between the networks is within meant parameters.Something is leading to a time delay between the networks.

40. Which network service instantly assigns IP addresses to devices on the network?

DHCPTelnetDNStraceroute

Explanation: Dynamic hold Configuration Protocol (DHCP) can be used to allow end devices to automatically configure IP information, such as their IP address, subnet mask, DNS server, and default gateway. The DNS organization is used to carry out domain surname resolution, mapping hostnames come IP addresses. Telnet is a technique for remotely accessing a CLI session of a move or router. Traceroute is a command used to identify the course a packet takes together it traverses the network.


41. Which command deserve to an administrator execute to identify what user interface a router will use to with remote networks?

show arpshow interfacesshow ip routeshow protocols

Explanation: The show ip route command is provided to display screen the IP routing table that the router. The IP routing table will present a list of recognized local and also remote networks and the interfaces that the router will usage to reach those networks.


42. ~ above which two interfaces or ports deserve to security be improved by configuring executive, management timeouts? (Choose two.)

Fast Ethernet interfacesconsole portsserial interfacesvty portsloopback interfaces

Explanation: executive timeouts allow the Cisco maker to immediately disconnect individuals after they have been idle for the specified time. Console, vty, and also aux ports deserve to be configured v executive timeouts.


43. When configuring SSH ~ above a router to implement secure network management, a network engineer has actually issued the login local and transport intake ssh heat vty commands. What three extr configuration actions have to be perform to complete the SSH configuration? (Choose three.)

Set the user privilege levels.Generate the asymmetric RSA keys.Configure the correct IP domain name.Configure role-based CLI access.Create a valid neighborhood username and also password database.Manually permit SSH after the RSA tricks are generated.

Explanation: SSH is automatically allowed after the RSA keys are generated. Setup user privilege levels and also configuring role-based CLI accessibility are an excellent security practices yet are no a requirement of implementing SSH.


44. What is considered the most effective means to minimize a worm attack?

Change device passwords every 30 days.Ensure that all systems have the most present virus definitions.Ensure the AAA is configured in the network.Download defense updates from the operating system vendor and patch all delicate systems.

Explanation: due to the fact that worms take advantage of vulnerabilities in the device itself, the most effective means to reduce worm strikes is to download protection updates indigenous the operation system seller and job all fragile systems.


45. I beg your pardon statement explains the ping and tracert commands?

Tracert reflects each hop, if ping mirrors a destination reply only.Tracert supplies IP addresses; ping does not.Both ping and tracert can display results in a graphical display.Ping shows whether the transmission is successful; tracert does not.

Explanation: The ping utility exam end-to-end connectivity between the 2 hosts. However, if the article does no reach the destination, there is no means to determine where the trouble is located. On the other hand, the traceroute utility (tracert in Windows) traces the course a post takes from its resource to the destination. Traceroute displays each hop follow me the way and the time it takes for the blog post to obtain to the network and back.


46. A technician is to document the present configurations of all network tools in a college, consisting of those in off-site buildings. Which protocol would be finest to use to securely accessibility the network devices?

FTPHTTPSSHTelnet

Explanation: Telnet sends passwords and other info in clean text, when SSH encrypts that is data. FTP and HTTP perform not administer remote maker access for configuration purposes.


47. Open the PT Activity. Execute the work in the task instructions and also then price the question.


*

CCNA 1 v7 Modules 16 – 17 Building and Securing a little Network Exam


Which command has to be configured top top the router to complete the SSH configuration?

service password-encryptiontransport input sshenable an enig classip domain-name cisco.com

Explanation: The absent command to complete the SSH configuration is transport entry ssh in line vty 0 4 mode.The commands service password-encryption and enable mystery class do configure secure features on the router, but are not required to configure SSH. The command ip domain-name cisco.com is no required since the command ip domain-name span.com has to be used.


48. An administrator decides to usage “WhatAreyouwaiting4” as the password top top a newly set up router. I m sorry statement uses to the password choice?

It is solid because it supplies a passphrase.It is weak since it is frequently the default password on brand-new devices.It is weak due to the fact that it uses conveniently found an individual information.It is weak because it is a word that is easily discovered in the dictionary.

49. An administrator decides to use “pR3s!d7n&0” as the password ~ above a newly set up router. I beg your pardon statement applies to the password choice?

It is solid because it offers a minimum that 10 numbers, letters and special characters.It is weak since it is often the default password on new devices.It is weak due to the fact that it uses conveniently found personal information.It is weak since it is a word the is easily discovered in the dictionary.

50. An administrator decides to usage “5$7*4#033!” as the password top top a newly set up router. I m sorry statement applies to the password choice?

It is strong because it includes 10 numbers and also special characters.It is weak because it is regularly the default password on brand-new devices.It is weak since it uses quickly found personal information.It is solid because it uses a minimum that 10 numbers, letters and special characters.

51. An administrator decides to usage “pR3s!d7n&0” together the password on a newly set up router. I beg your pardon statement applies to the password choice?

It is solid because it provides a minimum the 10 numbers, letters and also special characters.It is weak because it is a word that is easily found in the dictionary.It is solid because it offers a passphrase.It is strong because it includes 10 numbers and special characters.

52. One administrator decides to usage “12345678!” as the password top top a newly mounted router. Which statement uses to the password choice?

It is weak because it supplies a series of numbers or letters.It is solid because it uses a passphrase.It is weak since it is a word the is easily uncovered in the dictionary.It is solid because it provides a minimum of 10 numbers, letters and special characters.

53. An administrator decides to usage “admin” as the password on a newly set up router. I beg your pardon statement uses to the password choice?

It is weak because it is frequently the default password on brand-new devices.It is solid because it offers a passphrase.It is strong because it provides a minimum that 10 numbers, letters and also special characters.It is strong because it contains 10 numbers and special characters.

54. One administrator decides to usage “Feb121978” together the password top top a newly mounted router. I m sorry statement applies to the password choice?

It is weak since it uses conveniently found personal information.It is strong because it supplies a passphrase.It is weak since it is a word that is easily discovered in the dictionary.It is strong because it supplies a minimum of 10 numbers, letters and special characters.

55. An administrator decides to usage “password” as the password ~ above a newly installed router. I beg your pardon statement uses to the password choice?

It is weak since it is a frequently used password.It is weak because it is a word that is easily discovered in the dictionary.It is solid because it supplies a passphrase.It is strong because it uses a minimum of 10 numbers, letters and also special characters.

56. One administrator decides to usage “RobErT” as the password on a newly installed router. I beg your pardon statement applies to the password choice?

It is weak since it uses easily found personal information.It is strong because it supplies a passphrase.It is solid because it provides a minimum of 10 numbers, letters and also special characters.It is strong because it contains 10 numbers and special characters.

57. An administrator decides to usage “Elizabeth” together the password top top a newly mounted router. Which statement uses to the password choice?

It is weak due to the fact that it uses quickly found personal information.It is strong because it provides a passphrase.It is weak because it is a word that is easily uncovered in the dictionary.It is strong because it supplies a minimum of 10 numbers, letters and special characters.

Rules for strong passwords:* minimum the 8 characters, preferably 10.* use complicated combinations of numbers, unique characters, and also upper and also lower case letters.* avoid repetition, typical dictionary words, letter or number sequences.* protect against names of children, relatives, pets, birthdays, or any type of easily identifiable an individual information.* deserve to be developed by misspelling words or replacing vowels with numbers or distinct characters.

See more: Virtual Families 2 How To Cure Hiccups, How Do You Cure Hiccups On Virtual Families

58. A network technician is troubleshooting an issue and also needs to verify the IP addresses of all interfaces ~ above a router. What is the best command to usage to accomplish the task?

show ip user interface briefnslookupipconfig getifaddr en0show ip route

59. Students who are linked to the exact same switch are having slower 보다 normal solution times. The administrator suspects a duplex setup issue. What is the best command to use to achieve the task?

show interfacesipconfig getifaddr en0copy running-config startup-configshow ip nat translations

60. A user wants to understand the IP resolve of the PC. What is the finest command to usage to accomplish the task?

ipconfigcopy running-config startup-configshow interfacesshow ip nat translations

61. A student desires to save a router configuration to NVRAM. What is the ideal command to usage to accomplish the task?

copy running-config startup-configshow interfacesshow ip nat translationsshow ip route

62. A support technician demands to recognize the IP attend to of the wireless user interface on a MAC. What is the ideal command to usage to accomplish the task?

ipconfig getifaddr en0copy running-config startup-configshow interfacesshow ip nat translations

63. A network technician is troubleshooting an issue and also needs come verify every one of the IPv6 user interface addresses on a router. What is the best command to use to achieve the task?

show ipv6 interfaceshow interfacesshow ip nat translationsshow ip route

64. A teacher is having challenges connecting his computer to the great network. He requirements to verify the a default gateway is configured correctly. What is the finest command to use to attain the task?

ipconfigcopy running-config startup-configshow interfacesshow ip nat translations

65. Just employees connected to IPv6 interfaces room having difficulty connecting to far networks. The analyst desires to verify that IPv6 routing has actually been enabled. What is the best command to usage to accomplish the task?

show running-configshow interfacescopy running-config startup-configshow ip nat translations

66. An administrator is troubleshooting connectivity issues and needs to identify the IP resolve of a website. What is the best command to usage to attain the task?

nslookupshow ipv6 routeshow ipv6 interfacecopy startup-config running-config

67. Just employees connected to IPv6 interfaces space having challenge connecting to remote networks. The analyst desires to verify that IPv6 routing has been enabled. What is the finest command to use to accomplish the task?

show running-configshow ipv6 routeshow ipv6 interfacecopy startup-config running-config

68. What is a properties of UDP?

UDP datagrams take it the very same path and arrive in the correct order in ~ the destination.​Applications that use UDP are always considered unreliable.​UDP reassembles the obtained datagrams in the stimulate they to be received.UDP just passes data to the network when the location is prepared to get the data.