Valid SY0-601 Dumps shared by ExamDiscuss.com for Helping Passing SY0-601 Exam! ExamDiscuss.com now offer the newest SY0-601 exam dumps, the ExamDiscuss.com SY0-601 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SY0-601 dumps with Test Engine here:

Access SY0-601 Dumps Premium Version
(1061 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 351/405

An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker s intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.
Which of the following social-engineering attacks does this describe?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (405q)
Question 1: user's PC was recently infected by malware. The user has a l...
Question 2: A company's bank has reported that multiple corporate credit...
Question 3: A company uses wireless tor all laptops and keeps a very det...
1 commentQuestion 4: Joe, an employee, is transferring departments and is providi...
Question 5: A Chief Security Officer (CSO) was notified that a customer ...
Question 6: A systems administrator is considering different backup solu...
Question 7: A security analyst was asked to evaluate a potential attack ...
Question 8: Which of the following actions would be recommended to impro...
1 commentQuestion 9: Which of the following distributes data among nodes, making ...
1 commentQuestion 10: A security analyst wants to verify that a client-server (non...
Question 11: A security administrator needs to create a RAIS configuratio...
Question 12: An organization regularly scans its infrastructure for missi...
Question 13: A penetration tester successfully gained access to a company...
Question 14: An enterprise has hired an outside security firm to facilita...
Question 15: A systems administrator needs to install a new wireless netw...
Question 16: A newly purchased corporate WAP needs to be configured in th...
Question 17: A Chief Security Officer (CSO) has asked a technician to dev...
1 commentQuestion 18: A company recently experienced a significant data loss when ...
Question 19: Which of the following disaster recovery tests is The LEAST ...
Question 20: A security analyst needs to make a recommendation for restri...
Question 21: Select the appropriate attack and remediation from each drop...
Question 22: Accompany deployed a WiFi access point in a public area and ...
Question 23: A security analyst is investigation an incident that was fir...
Question 24: An organization would like to give remote workers the abilit...
1 commentQuestion 25: The SIEM at an organization has detected suspicious traffic ...
Question 26: Users at organization have been installing programs from the...
Question 27: Which of the following describes the ability of code to targ...
Question 28: Which of the following job roles would sponsor data quality ...
Question 29: Which of the following describes the BEST approach for deplo...
Question 30: Select the appropriate attack and remediation from each drop...
1 commentQuestion 31: Under GDPR, which of the following is MOST responsible for t...
1 commentQuestion 32: An incident has occurred in the production environment. Anal...
Question 33: Which of the following cryptographic concepts would a securi...
Question 34: While reviewing an alert that shows a malicious request on o...
Question 35: An organization has decided to host its web application and ...
Question 36: A penetration tester was able to compromise an internal serv...
Question 37: An organization is concerned that its hosted web servers are...
Question 38: A systems administrators considering diferent backup soliton...
1 commentQuestion 39: A vulnerability has been discovered and a known patch to add...
Question 40: An analyst visits an internet forum looking for information ...
Question 41: Which of the following is the correct order of volatility fr...
Question 42: A smart retail business has a local store and a newly establ...
Question 43: Which of the following BEST describes the MFA attribute that...
Question 44: Which of the following are requirements that must be configu...
Question 45: Ahelp desk technician receives an email from the Chief Infor...
Question 46: The following are the logs of a successful attack. (Exhibit)...
Question 47: An attack has occurred against a company. INSTRUCTIONS You h...
Question 48: The security administrator has installed a new firewall whic...
Question 49: A user forwarded a suspicious email to the security team, Up...
Question 50: A security administrator suspects an employee has been email...
Question 51: A security engineer is setting up passwordless authenticatio...
Question 52: An enterprise has hired an outside security firm to conduct ...
Question 53: A major political party experienced a server breach. The hac...
Question 54: A security analyst is receiving several alerts per user and ...
Question 55: A customer has reported that an organization's website displ...
Question 56: A security analyst is concerned about critical vulnerabiliti...
Question 57: A security analyst is reviewing a new website that will soon...
Question 58: A security analyst was deploying a new website and found a c...
Question 59: A security engineer at an offline government facility is con...
Question 60: A company recently added a DR site and is redesigning the ne...
Question 61: A client sent several inquiries to a project manager about t...
Question 62: Which of the following prevents an employee from seeing a co...
Question 63: A junior security analyst is reviewing web server logs and i...
1 commentQuestion 64: A systems administrator wants to disable the use of username...
Question 65: A network administrator has been asked to install an IDS to ...
Question 66: Several employees have noticed other bystanders can clearly ...
Question 67: A Chief Information Security Officer (CISO) is evaluating th...
1 commentQuestion 68: A user's account is constantly being locked out. Upon furthe...
Question 69: Which of the following provides a catalog of security and pr...
Question 70: A security analyst receives a SIEM alert that someone logged...
Question 71: A Chief Information Security Officer (CISO) is evaluating th...
Question 72: An organization is concerned that its hosted web servers are...
Question 73: A company was compromised, and a security analyst discovered...
Question 74: A company is implementing a new SIEM to log and send alerts ...
1 commentQuestion 75: A security analyst is tasked with defining the "something yo...
Question 76: A new vulnerability in the SMB protocol on the Windows syste...
Question 77: Given the following logs: (Exhibit) Which of the following B...
Question 78: A small business just recovered from a ransomware attack aga...
1 commentQuestion 79: A financial institution would like to stare is customer data...
Question 80: The following are the logs of a successful attack. (Exhibit)...
Question 81: A security engineer is setting up passwordless authenticatio...
Question 82: A security researcher has aferted an organuzation that its s...
Question 83: An organization relies on third-party video conferencing to ...
Question 84: A company needs to centralize its logs to create a baseline ...
2 commentQuestion 85: A company wants to restrict emailing of PHI documents. The c...
1 commentQuestion 86: A company's Chief Information Officer (CIO) is meeting with ...
Question 87: A network administrator has been asked to install an IDS to ...
Question 88: A cybersecurity analyst reviews the log files from a web ser...
Question 89: Which of the following must be in place before implementing ...
Question 90: The IT department at a university is concerned about profess...
Question 91: A security administrator is working on a solution to protect...
Question 92: An attacker was eavesdropping on a user who was shopping onl...
Question 93: Which of the following function as preventive, detective, an...
Question 94: A security analyst needs to determine how an attacker was ab...
Question 95: A security analyst Is hardening a Linux workstation and must...
Question 96: A company wants to deploy systems alongside production syste...
Question 97: A network analyst is setting up a wireless access point for ...
Question 98: A security analyst needs to be able to search and correlate ...
Question 99: An organization just experienced a major cyberattack modem. ...
Question 100: Which of the following BEST explains the difference between ...
Question 101: During an asset inventory, several assets, supplies, and mis...
Question 102: Which of the technologies is used to actively monitor for sp...
Question 103: Which of the following is used to ensure that evidence is ad...
Question 104: hich of the following would be MOST effective to contain a r...
Question 105: The following are the logs of a successful attack. (Exhibit)...
Question 106: A network engineer and a security engineer are discussing wa...
Question 107: Which of the following would BEST identify and remediate a d...
Question 108: When planning to build a virtual environment, an administrat...
Question 109: An incident response technician collected a mobile device du...
Question 110: A company posts a sign indicating its server room is under v...
Question 111: An organization recently acquired an ISO 27001 certification...
Question 112: Select the appropriate attack and remediation from each drop...
Question 113: An attacker has successfully exfiltrated several non-salted ...
Question 114: The Chief Information Security Officer (CISO) has decided to...
Question 115: A security analyst was deploying a new website and found a c...
Question 116: A security analyst is investigating some users who are being...
Question 117: Per company security policy, IT staff members are required t...
Question 118: A dynamic application vulnerability scan identified code inj...
Question 119: In which of the following risk management strategies would c...
Question 120: Whiten of the folowing BEST describes the MFA atiribute tha ...
Question 121: After segmenting the network, the network manager wants to c...
Question 122: Hotspot Question The security administration has installed a...
Question 123: Which of the following will provide the BEST physical securi...
Question 124: An analyst is reviewing logs associated with an attack. The ...
Question 125: Which of the following are the MOST likely vectors for the u...
Question 126: As part of a company's ongoing SOC maturation process, the c...
Question 127: A penetration tester is fuzzing an application to identify w...
Question 128: Which of the following would be BEST to establish between or...
Question 129: To reduce costs and overhead, an organization wants to move ...
Question 130: A security analyst is reviewing the following output from a ...
Question 131: A network administrator has been alerted that web pages are ...
Question 132: A security analyst Is investigating multiple hosts that are ...
Question 133: A cybersecunty administrator needs to implement a Layer 7 se...
Question 134: An analyst visits an internet forum looking for information ...
Question 135: A systems administrator needs to install a new wireless netw...
Question 136: An employee has been charged with fraud and is suspected of ...
Question 137: Due to unexpected circumstances, an IT company must vacate i...
Question 138: A security analyst is investigating an incident to determine...
Question 139: A company has drafted an insider-threat policy that prohibit...
Question 140: A security proposal was set up to track requests for remote ...
Question 141: A security modern may have occurred on the desktop PC of an ...
Question 142: After a recent security breach a security analyst reports th...
Question 143: A developer is concerned about people downloading fake malwa...
Question 144: An organization wants seamless authentication to its applica...
Question 145: The Chief Information Security Officer wants to prevent exfi...
Question 146: A user reports trouble using a corporate laptop. The laptop ...
Question 147: A company recently suffered a breach in which an attacker wa...
Question 148: A network engineer needs to build a solution that will allow...
Question 149: The Chief Information Security Officer warns lo prevent exfi...
Question 150: A user's PC was recently infected by malware. The user has a...
Question 151: A Chief Security Officer (CSO) is concerned about the amount...
Question 152: A user reports falling for a phishing email to an analyst. W...
Question 153: A company is setting up a web server on the Internet that wi...
Question 154: Administrators have allowed employee to access their company...
Question 155: A newly purchased corporate WAP needs to be configured in th...
Question 156: During a recent incident an external attacker was able to ex...
Question 157: An organization just experienced a major cyberattack modem. ...
Question 158: A forensics investigator is examining a number of unauthoriz...
Question 159: A security analyst needs to determine how an attacker was ab...
Question 160: An administrator is experiencing issues when trying to uploa...
Question 161: A security engineer is setting up passwordless authenticatio...
Question 162: The Chief Executive Officer (CEO) of an organization would l...
Question 163: A systems administrator needs to install a new wireless netw...
Question 164: Which of the following distributes data among nodes, making ...
Question 165: On which of the following is the live acquisition of data fo...
Question 166: A500 is implementing an insider threat detection program, Th...
Question 167: A security analyst wants to verify that a client-server (non...
Question 168: An organization relies on third-party video conferencing to ...
Question 169: After a hardware incident, an unplanned emergency maintenanc...
Question 170: A penetration tester was able to compromise an internal serv...
Question 171: A security modern may have occurred on the desktop PC of an ...
Question 172: A store receives reports that shoppers' credit card informat...
Question 173: A company wants to deploy PKI on its Internet-facing website...
Question 174: A small business just recovered from a ransomware attack aga...
Question 175: A cybersecurity manager has scheduled biannual meetings with...
Question 176: A mae Clotting company recently lost 4 aege amount of propee...
Question 177: An engineer needs to deploy a security measure to identify a...
Question 178: After entering a username and password, and administrator mu...
Question 179: A large enterprise has moved all Hs data to the cloud behind...
Question 180: A security analyst needs to be proactive in understanding th...
Question 181: A security analyst is investigating suspicious traffic on th...
Question 182: A company is experiencing an increasing number of systems th...
Question 183: A security analyst is reviewing logs on a server and observe...
Question 184: A company is implementing BYOD and wants to ensure all users...
Question 185: Which of the following secure coding techniques makes compro...
Question 186: A security analyst sees the following log output while revie...
Question 187: A systems administrator needs to install a new wireless netw...
Question 188: A company recently experienced a data breach and the source ...
Question 189: A recent security audit reveaied that @ popular website with...
Question 190: A security auditor is reviewing vulnerability scan data prov...
Question 191: The CSIRT is reviewing the lessons learned from a recent inc...
Question 192: Which of the following often operates in a client-server arc...
Question 193: Aconbgany uses a drone for precise perimeter and boundary mo...
Question 194: A Chief Information Security Officer has defined resiliency ...
Question 195: A security analyst is reviewing logs on a server and observe...
Question 196: Select the appropriate attack and remediation from each drop...
Question 197: A backdoor was detected on the containerized application env...
Question 198: A penetration tester successfully gained access ta a company...
Question 199: A security analyst was called to Investigate a file received...
Question 200: A malicious actor recently penetration a company's network a...
Question 201: A network engineer is troubleshooting wireless network conne...
Question 202: A network administrator has been alerted that web pages are ...
Question 203: A cybersecurity department purchased o new PAM solution. The...
Question 204: Which of the following risk management strategies would an o...
Question 205: A company recently added a DR site and is redesigning the ne...
Question 206: Given the following logs: (Exhibit) Which of the following B...
Question 207: Which of the following control Types would be BEST to use in...
Question 208: Which of the following environments typically hosts the curr...
Question 209: A business operations manager is concerned that a PC that is...
Question 210: A user reports falling for a phishing email to an analyst. W...
Question 211: A cybersecurity administrator has a reduced team and needs t...
Question 212: During a security audit of a company's network, unsecure pro...
Question 213: A developer is building a new portal to deliver single-pane-...
Question 214: After consulting with the Chief Risk Officer (CRO). A manage...
Question 215: Which of the following would be the BEST way to analyze disk...
Question 216: An information security manager for an organization is compl...
Question 217: A cybersecurity analyst reviews the log files from a web ser...
Question 218: Security analysts are conducting an investigation of an atta...
Question 219: A bank detects fraudulent activity on user's account. The us...
Question 220: A company has three technicians who share the same credentia...
Question 221: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 222: A developer is building a new portal to deliver single-pane-...
Question 223: Which of the following would BEST identify and remediate a d...
Question 224: A recent audit cited a risk involving numerous low-criticali...
Question 225: Which of the following uses six initial steps that provide b...
Question 226: A cybersecurity manager has scheduled biannual meetings with...
Question 227: Which of the following is assured when a user signs an email...
Question 228: Given the following logs: (Exhibit) Which of the following B...
Question 229: Several universities are participating in a collaborative re...
Question 230: An analyst is reviewing logs associated with an attack. The ...
Question 231: The Chief information Security Officer wants to prevent exfi...
Question 232: A Chief Information Officer is concerned about employees usi...
Question 233: A company recently added a DR site and is redesigning the ne...
Question 234: A public relations team will be taking a group of guest on a...
Question 235: A news article states hackers have been selling access to Io...
Question 236: A company is implementing a new SIEM to log and send alerts ...
Question 237: Which of the following is MOST likely to outline the roles a...
Question 238: A security analyst is investigating some users who are being...
Question 239: Several attempts have been made lo pick the door lock of a s...
Question 240: A security analyst is reviewing web-application logs and fin...
Question 241: An organization has implemented a two-step verification proc...
Question 242: Leveraging the information supplied below, complete the CSR ...
Question 243: An engineer is setting up a VDI environment for a factory lo...
Question 244: A security researcher is tracking an adversary by noting its...
Question 245: Which of the following is a cryptographic concept that opera...
Question 246: Which of the following are the MOST likely vectors for the u...
Question 247: A developer is building a new portal to deliver single-pane-...
Question 248: An employee received multiple messages on a mobile device. T...
Question 249: A company just developed a new web application for a governm...
Question 250: The Chief Information Security Officer (CISO) has requested ...
Question 251: A junior security analyst is conducting an analysis after pa...
Question 252: A company wants to improve end users experiences when they t...
Question 253: Which of the following allows for functional test data to be...
Question 254: All security analysts workstations at a company have network...
Question 255: Hackers recently attacked a company's network and obtained s...
Question 256: A security analyst is performing a forensic investigation co...
Question 257: A security engineer is setting up passwordless authenticatio...
Question 258: one of the attendees starts to notice delays in the connecti...
Question 259: A company is providing security awareness training regarding...
Question 260: A forensics investigator is examining a number of unauthoriz...
Question 261: Certain users are reporting their accounts are being used to...
Question 262: A user reports trouble using a corporate laptop. The laptop ...
Question 263: A company is setting up a web server on the Internet that wi...
Question 264: An organization just experienced a major cyberattack modem. ...
Question 265: A system administrator needs to implement an access control ...
Question 266: Which of the following control Types would be BEST to use in...
Question 267: An analyst visits an internet forum looking for information ...
Question 268: A company recently experienced an inside attack using a corp...
Question 269: A penetration tester gains access to the network by exploiti...
Question 270: A startup company is using multiple SaaS and IaaS platform t...
Question 271: A security policy states that common words should not be use...
Question 272: Which of the following is assured when a user signs an email...
Question 273: After a hardware incident, an unplanned emergency maintenanc...
Question 274: Which of the following in the incident response process is t...
Question 275: In the middle of a cybersecurity, a security engineer remove...
Question 276: A security analyst is reviewing the following attack log out...
Question 277: A cloud service provider has created an environment where cu...
Question 278: Which of the following should be put in place when negotiati...
Question 279: Users reported several suspicious activities within the last...
Question 280: A security analyst is reviewing logs on a server and observe...
Question 281: A recently discovered zero-day exploit utilizes an unknown v...
Question 282: Which of the following conditions impacts data sovereignty?...
Question 283: A Chief information Officer is concemed about employees usin...
Question 284: A forensics investigator is examining a number of unauthoriz...
Question 285: While investigating a data leakage incident, a security anal...
Question 286: Which of the following processes will eliminate data using a...
Question 287: An organization Chief information Security Officer a positio...
Question 288: A Chief Security Officer is looking for a solution that can ...
Question 289: A company is implementing a DLP solution on the file server....
Question 290: An analyst Is generating a security report for the managemen...
Question 291: A security architect at a large, multinational organization ...
Question 292: The security administrator has installed a new firewall whic...
Question 293: An n that has a large number of mobile devices is explonng e...
Question 294: A security administrator needs to create a RAIS configuratio...
Question 295: A Chief Information Security Officer (CISO) needs to create ...
Question 296: Which of the following authentication methods sends out a un...
Question 297: While reviewing pcap data, a network security analyst is abl...
Question 298: An organization has been experiencing outages during holiday...
Question 299: A security analyst is reviewing the following attack log out...
Question 300: A network analyst is investigating compromised corporate inf...
Question 301: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 302: A client sent several inquiries to a project manager about t...
Question 303: An annual information security assessment has revealed that ...
Question 304: An organization's policy requires users to create passwords ...
Question 305: Which of the following is a known security nsk associated wi...
Question 306: A company recently experienced an attack in which a maliciou...
Question 307: Select the appropriate attack and remediation from each drop...
Question 308: During an incident response, an analyst applied rules to all...
Question 309: Which of the following incident response steps occurs before...
Question 310: A security administrator is trying to determine whether a se...
Question 311: The IT department at a university is concerned about profess...
Question 312: A security modern may have occurred on the desktop PC of an ...
Question 313: While investigating a data leakage incident a security analy...
Question 314: A security analyst is investigation an incident that was fir...
Question 315: Which of the following explains why RTO is included in a BIA...
Question 316: To mitigate the impact of a single VM being compromised by a...
Question 317: A company recently transitioned to a strictly BYOD culture d...
Question 318: A company needs to validate its updated incident response pl...
Question 319: A company recently moved sensitive videos between on-premise...
Question 320: A security team suspects that the cause of recent power cons...
Question 321: An attacker is exploiting a vulnerability that does not have...
Question 322: A security analyst receives a SIEM alert that someone logged...
Question 323: A security engineer is setting up passwordless authenticatio...
Question 324: A security analyst is reviewing the following output from a ...
Question 325: A company has discovered unauthorized devices are using its ...
Question 326: An organization has hired a security analyst to perform a pe...
Question 327: Which of the following is a benefit of including a risk mana...
Question 328: If a current private key is compromised, which of the follow...
Question 329: A privileged user at a company stole several proprietary doc...
Question 330: A security engineer needs to enhance MFA access to sensitive...
Question 331: An analyst is trying to identify insecure services thal are ...
Question 332: A company processes highly sensitive data and senior managem...
Question 333: A security analyst is Investigating a malware incident at a ...
Question 334: The IT department at a university is concerned about profess...
Question 335: Which of the following would be indicative of a hidden audio...
Question 336: An application developer accidentally uploaded a company's c...
Question 337: An organization is developing an authentication service for ...
Question 338: An organization is repairing the damage after an incident, W...
Question 339: A user reports constant lag and performance issues with the ...
Question 340: A security engineer is setting up passwordless authenticatio...
Question 341: An organization is having difficulty correlating events from...
Question 342: A security analyst receives a SIEM alert that someone logged...
Question 343: A security administrator is trying to determine whether a se...
Question 344: A security analyst is investigating suspicious traffic on th...
Question 345: An organization is building backup sever moms in geographica...
Question 346: An analyst visits an internet forum looking for information ...
Question 347: A security engineer is setting up passwordless authenticatio...
Question 348: Which of the following would BEST provide detective and corr...
Question 349: An attacker has successfully exfiltrated several non-salted ...
Question 350: A forensics investigator is examining a number of unauthoriz...
Question 351: An attacked is attempting to exploit users by creating a fak...
Question 352: During an investigation, the incident response team discover...
Question 353: An analyst is trying to identify insecure services thal are ...
Question 354: An organization implemented a process that compares the sett...
Question 355: Joe. a security analyst, recently performed a network discov...
Question 356: The security administrator has installed a new firewall whic...
Question 357: Select the appropriate attack and remediation from each drop...
Question 358: A security analyst receives a SIEM alert that someone logged...
Question 359: When selecting a technical solution for identity management,...
Question 360: The Chief Information Security Officer wants to prevent exfi...
Question 361: During a security assessment, a security analyst finds a fil...
Question 362: Joe, an employee, receives an email stating he won the lotte...
Question 363: A security analyst needs to determine how an attacker was ab...
Question 364: During an incident response, a security analyst observes the...
Question 365: A major clothing company recently lost a large amount of pro...
Question 366: A workwide manufacturing company has been experiencing email...
Question 367: A forensics investigator is examining a number of unauthoriz...
Question 368: A cyberthreat intelligence analyst is gathering data about a...
Question 369: A company was compromised, and a security analyst discovered...
Question 370: A security engineer needs to Implement the following require...
Question 371: As part of annual audit requirements, the security team perf...
Question 372: Which of the following are the MOST likely vectors for the u...
Question 373: A security administrator checks the table of a network switc...
Question 374: During a recent penetration test, the tester discovers large...
Question 375: A large financial services firm recently released informatio...
Question 376: A company was compromised, and a security analyst discovered...
Question 377: An organization is moving away from the use of client-side a...
Question 378: A security analyst is concerned about traffic initiated to t...
Question 379: Administrators have allowed employees to access their compan...
Question 380: A security analyst is investigating an incident that was fir...
Question 381: A financial analyst has been accused of violating the compan...
Question 382: A security analyst is evaluating the risks of authorizing mu...
Question 383: Select the appropriate attack and remediation from each drop...
Question 384: Which of the following will provide the BEST physical securi...
Question 385: The IT department's on-site developer has been with the team...
Question 386: A company discovered that terabytes of data have been exfilt...
Question 387: Which of the following is the BEST action to foster a consis...
Question 388: A security administrator needs to create a RAID configuratio...
Question 389: A Chief Security Officer (CSO) is concerned about the volume...
Question 390: The security administrator has installed a new firewall whic...
Question 391: A security analyst is Investigating a malware incident at a ...
Question 392: Which of the following concepts BEST describes tracking and ...
Question 393: The following are the logs of a successful attack. (Exhibit)...
Question 394: During an incident response process involving a laptop, a ho...
Question 395: A systems administrator is looking for a solution that will ...
Question 396: A user reports constant lag and performance issues with the ...
Question 397: hich of the folowing would be BEST for a technician to revie...
Question 398: A root cause analysis reveals that a web application outage ...
Question 399: A security engineer is setting up passwordless authenticatio...
Question 400: A systems analyst is responsible for generating a new digita...
Question 401: An attacker is attempting to exploit users by creating a fak...
Question 402: Which of the following policies establishes rules to measure...
Question 403: An organization is having difficulty correlating events from...
Question 404: An application owner has requested access for an external ap...
Question 405: An end user reports a computer has been acting slower than n...