Valid SY0-601 Dumps shared by ExamDiscuss.com for Helping Passing SY0-601 Exam! ExamDiscuss.com now offer the newest SY0-601 exam dumps, the ExamDiscuss.com SY0-601 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SY0-601 dumps with Test Engine here:

Access SY0-601 Dumps Premium Version
(1061 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 24/405

An organization would like to give remote workers the ability to use applications hosted inside the corporate network Users will be allowed to use their personal computers or they will be provided organization assets Either way no data or applications will be installed locally on any user systems Which of the following mobile solutions would accomplish these goals?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (405q)
Question 1: user's PC was recently infected by malware. The user has a l...
Question 2: A company's bank has reported that multiple corporate credit...
Question 3: A company uses wireless tor all laptops and keeps a very det...
1 commentQuestion 4: Joe, an employee, is transferring departments and is providi...
Question 5: A Chief Security Officer (CSO) was notified that a customer ...
Question 6: A systems administrator is considering different backup solu...
Question 7: A security analyst was asked to evaluate a potential attack ...
Question 8: Which of the following actions would be recommended to impro...
1 commentQuestion 9: Which of the following distributes data among nodes, making ...
1 commentQuestion 10: A security analyst wants to verify that a client-server (non...
Question 11: A security administrator needs to create a RAIS configuratio...
Question 12: An organization regularly scans its infrastructure for missi...
Question 13: A penetration tester successfully gained access to a company...
Question 14: An enterprise has hired an outside security firm to facilita...
Question 15: A systems administrator needs to install a new wireless netw...
Question 16: A newly purchased corporate WAP needs to be configured in th...
Question 17: A Chief Security Officer (CSO) has asked a technician to dev...
1 commentQuestion 18: A company recently experienced a significant data loss when ...
Question 19: Which of the following disaster recovery tests is The LEAST ...
Question 20: A security analyst needs to make a recommendation for restri...
Question 21: Select the appropriate attack and remediation from each drop...
Question 22: Accompany deployed a WiFi access point in a public area and ...
Question 23: A security analyst is investigation an incident that was fir...
Question 24: An organization would like to give remote workers the abilit...
1 commentQuestion 25: The SIEM at an organization has detected suspicious traffic ...
Question 26: Users at organization have been installing programs from the...
Question 27: Which of the following describes the ability of code to targ...
Question 28: Which of the following job roles would sponsor data quality ...
Question 29: Which of the following describes the BEST approach for deplo...
Question 30: Select the appropriate attack and remediation from each drop...
1 commentQuestion 31: Under GDPR, which of the following is MOST responsible for t...
1 commentQuestion 32: An incident has occurred in the production environment. Anal...
Question 33: Which of the following cryptographic concepts would a securi...
Question 34: While reviewing an alert that shows a malicious request on o...
Question 35: An organization has decided to host its web application and ...
Question 36: A penetration tester was able to compromise an internal serv...
Question 37: An organization is concerned that its hosted web servers are...
Question 38: A systems administrators considering diferent backup soliton...
1 commentQuestion 39: A vulnerability has been discovered and a known patch to add...
Question 40: An analyst visits an internet forum looking for information ...
Question 41: Which of the following is the correct order of volatility fr...
Question 42: A smart retail business has a local store and a newly establ...
Question 43: Which of the following BEST describes the MFA attribute that...
Question 44: Which of the following are requirements that must be configu...
Question 45: Ahelp desk technician receives an email from the Chief Infor...
Question 46: The following are the logs of a successful attack. (Exhibit)...
Question 47: An attack has occurred against a company. INSTRUCTIONS You h...
Question 48: The security administrator has installed a new firewall whic...
Question 49: A user forwarded a suspicious email to the security team, Up...
Question 50: A security administrator suspects an employee has been email...
Question 51: A security engineer is setting up passwordless authenticatio...
Question 52: An enterprise has hired an outside security firm to conduct ...
Question 53: A major political party experienced a server breach. The hac...
Question 54: A security analyst is receiving several alerts per user and ...
Question 55: A customer has reported that an organization's website displ...
Question 56: A security analyst is concerned about critical vulnerabiliti...
Question 57: A security analyst is reviewing a new website that will soon...
Question 58: A security analyst was deploying a new website and found a c...
Question 59: A security engineer at an offline government facility is con...
Question 60: A company recently added a DR site and is redesigning the ne...
Question 61: A client sent several inquiries to a project manager about t...
Question 62: Which of the following prevents an employee from seeing a co...
Question 63: A junior security analyst is reviewing web server logs and i...
1 commentQuestion 64: A systems administrator wants to disable the use of username...
Question 65: A network administrator has been asked to install an IDS to ...
Question 66: Several employees have noticed other bystanders can clearly ...
Question 67: A Chief Information Security Officer (CISO) is evaluating th...
1 commentQuestion 68: A user's account is constantly being locked out. Upon furthe...
Question 69: Which of the following provides a catalog of security and pr...
Question 70: A security analyst receives a SIEM alert that someone logged...
Question 71: A Chief Information Security Officer (CISO) is evaluating th...
Question 72: An organization is concerned that its hosted web servers are...
Question 73: A company was compromised, and a security analyst discovered...
Question 74: A company is implementing a new SIEM to log and send alerts ...
1 commentQuestion 75: A security analyst is tasked with defining the "something yo...
Question 76: A new vulnerability in the SMB protocol on the Windows syste...
Question 77: Given the following logs: (Exhibit) Which of the following B...
Question 78: A small business just recovered from a ransomware attack aga...
1 commentQuestion 79: A financial institution would like to stare is customer data...
Question 80: The following are the logs of a successful attack. (Exhibit)...
Question 81: A security engineer is setting up passwordless authenticatio...
Question 82: A security researcher has aferted an organuzation that its s...
Question 83: An organization relies on third-party video conferencing to ...
Question 84: A company needs to centralize its logs to create a baseline ...
2 commentQuestion 85: A company wants to restrict emailing of PHI documents. The c...
1 commentQuestion 86: A company's Chief Information Officer (CIO) is meeting with ...
Question 87: A network administrator has been asked to install an IDS to ...
Question 88: A cybersecurity analyst reviews the log files from a web ser...
Question 89: Which of the following must be in place before implementing ...
Question 90: The IT department at a university is concerned about profess...
Question 91: A security administrator is working on a solution to protect...
Question 92: An attacker was eavesdropping on a user who was shopping onl...
Question 93: Which of the following function as preventive, detective, an...
Question 94: A security analyst needs to determine how an attacker was ab...
Question 95: A security analyst Is hardening a Linux workstation and must...
Question 96: A company wants to deploy systems alongside production syste...
Question 97: A network analyst is setting up a wireless access point for ...
Question 98: A security analyst needs to be able to search and correlate ...
Question 99: An organization just experienced a major cyberattack modem. ...
Question 100: Which of the following BEST explains the difference between ...
Question 101: During an asset inventory, several assets, supplies, and mis...
Question 102: Which of the technologies is used to actively monitor for sp...
Question 103: Which of the following is used to ensure that evidence is ad...
Question 104: hich of the following would be MOST effective to contain a r...
Question 105: The following are the logs of a successful attack. (Exhibit)...
Question 106: A network engineer and a security engineer are discussing wa...
Question 107: Which of the following would BEST identify and remediate a d...
Question 108: When planning to build a virtual environment, an administrat...
Question 109: An incident response technician collected a mobile device du...
Question 110: A company posts a sign indicating its server room is under v...
Question 111: An organization recently acquired an ISO 27001 certification...
Question 112: Select the appropriate attack and remediation from each drop...
Question 113: An attacker has successfully exfiltrated several non-salted ...
Question 114: The Chief Information Security Officer (CISO) has decided to...
Question 115: A security analyst was deploying a new website and found a c...
Question 116: A security analyst is investigating some users who are being...
Question 117: Per company security policy, IT staff members are required t...
Question 118: A dynamic application vulnerability scan identified code inj...
Question 119: In which of the following risk management strategies would c...
Question 120: Whiten of the folowing BEST describes the MFA atiribute tha ...
Question 121: After segmenting the network, the network manager wants to c...
Question 122: Hotspot Question The security administration has installed a...
Question 123: Which of the following will provide the BEST physical securi...
Question 124: An analyst is reviewing logs associated with an attack. The ...
Question 125: Which of the following are the MOST likely vectors for the u...
Question 126: As part of a company's ongoing SOC maturation process, the c...
Question 127: A penetration tester is fuzzing an application to identify w...
Question 128: Which of the following would be BEST to establish between or...
Question 129: To reduce costs and overhead, an organization wants to move ...
Question 130: A security analyst is reviewing the following output from a ...
Question 131: A network administrator has been alerted that web pages are ...
Question 132: A security analyst Is investigating multiple hosts that are ...
Question 133: A cybersecunty administrator needs to implement a Layer 7 se...
Question 134: An analyst visits an internet forum looking for information ...
Question 135: A systems administrator needs to install a new wireless netw...
Question 136: An employee has been charged with fraud and is suspected of ...
Question 137: Due to unexpected circumstances, an IT company must vacate i...
Question 138: A security analyst is investigating an incident to determine...
Question 139: A company has drafted an insider-threat policy that prohibit...
Question 140: A security proposal was set up to track requests for remote ...
Question 141: A security modern may have occurred on the desktop PC of an ...
Question 142: After a recent security breach a security analyst reports th...
Question 143: A developer is concerned about people downloading fake malwa...
Question 144: An organization wants seamless authentication to its applica...
Question 145: The Chief Information Security Officer wants to prevent exfi...
Question 146: A user reports trouble using a corporate laptop. The laptop ...
Question 147: A company recently suffered a breach in which an attacker wa...
Question 148: A network engineer needs to build a solution that will allow...
Question 149: The Chief Information Security Officer warns lo prevent exfi...
Question 150: A user's PC was recently infected by malware. The user has a...
Question 151: A Chief Security Officer (CSO) is concerned about the amount...
Question 152: A user reports falling for a phishing email to an analyst. W...
Question 153: A company is setting up a web server on the Internet that wi...
Question 154: Administrators have allowed employee to access their company...
Question 155: A newly purchased corporate WAP needs to be configured in th...
Question 156: During a recent incident an external attacker was able to ex...
Question 157: An organization just experienced a major cyberattack modem. ...
Question 158: A forensics investigator is examining a number of unauthoriz...
Question 159: A security analyst needs to determine how an attacker was ab...
Question 160: An administrator is experiencing issues when trying to uploa...
Question 161: A security engineer is setting up passwordless authenticatio...
Question 162: The Chief Executive Officer (CEO) of an organization would l...
Question 163: A systems administrator needs to install a new wireless netw...
Question 164: Which of the following distributes data among nodes, making ...
Question 165: On which of the following is the live acquisition of data fo...
Question 166: A500 is implementing an insider threat detection program, Th...
Question 167: A security analyst wants to verify that a client-server (non...
Question 168: An organization relies on third-party video conferencing to ...
Question 169: After a hardware incident, an unplanned emergency maintenanc...
Question 170: A penetration tester was able to compromise an internal serv...
Question 171: A security modern may have occurred on the desktop PC of an ...
Question 172: A store receives reports that shoppers' credit card informat...
Question 173: A company wants to deploy PKI on its Internet-facing website...
Question 174: A small business just recovered from a ransomware attack aga...
Question 175: A cybersecurity manager has scheduled biannual meetings with...
Question 176: A mae Clotting company recently lost 4 aege amount of propee...
Question 177: An engineer needs to deploy a security measure to identify a...
Question 178: After entering a username and password, and administrator mu...
Question 179: A large enterprise has moved all Hs data to the cloud behind...
Question 180: A security analyst needs to be proactive in understanding th...
Question 181: A security analyst is investigating suspicious traffic on th...
Question 182: A company is experiencing an increasing number of systems th...
Question 183: A security analyst is reviewing logs on a server and observe...
Question 184: A company is implementing BYOD and wants to ensure all users...
Question 185: Which of the following secure coding techniques makes compro...
Question 186: A security analyst sees the following log output while revie...
Question 187: A systems administrator needs to install a new wireless netw...
Question 188: A company recently experienced a data breach and the source ...
Question 189: A recent security audit reveaied that @ popular website with...
Question 190: A security auditor is reviewing vulnerability scan data prov...
Question 191: The CSIRT is reviewing the lessons learned from a recent inc...
Question 192: Which of the following often operates in a client-server arc...
Question 193: Aconbgany uses a drone for precise perimeter and boundary mo...
Question 194: A Chief Information Security Officer has defined resiliency ...
Question 195: A security analyst is reviewing logs on a server and observe...
Question 196: Select the appropriate attack and remediation from each drop...
Question 197: A backdoor was detected on the containerized application env...
Question 198: A penetration tester successfully gained access ta a company...
Question 199: A security analyst was called to Investigate a file received...
Question 200: A malicious actor recently penetration a company's network a...
Question 201: A network engineer is troubleshooting wireless network conne...
Question 202: A network administrator has been alerted that web pages are ...
Question 203: A cybersecurity department purchased o new PAM solution. The...
Question 204: Which of the following risk management strategies would an o...
Question 205: A company recently added a DR site and is redesigning the ne...
Question 206: Given the following logs: (Exhibit) Which of the following B...
Question 207: Which of the following control Types would be BEST to use in...
Question 208: Which of the following environments typically hosts the curr...
Question 209: A business operations manager is concerned that a PC that is...
Question 210: A user reports falling for a phishing email to an analyst. W...
Question 211: A cybersecurity administrator has a reduced team and needs t...
Question 212: During a security audit of a company's network, unsecure pro...
Question 213: A developer is building a new portal to deliver single-pane-...
Question 214: After consulting with the Chief Risk Officer (CRO). A manage...
Question 215: Which of the following would be the BEST way to analyze disk...
Question 216: An information security manager for an organization is compl...
Question 217: A cybersecurity analyst reviews the log files from a web ser...
Question 218: Security analysts are conducting an investigation of an atta...
Question 219: A bank detects fraudulent activity on user's account. The us...
Question 220: A company has three technicians who share the same credentia...
Question 221: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 222: A developer is building a new portal to deliver single-pane-...
Question 223: Which of the following would BEST identify and remediate a d...
Question 224: A recent audit cited a risk involving numerous low-criticali...
Question 225: Which of the following uses six initial steps that provide b...
Question 226: A cybersecurity manager has scheduled biannual meetings with...
Question 227: Which of the following is assured when a user signs an email...
Question 228: Given the following logs: (Exhibit) Which of the following B...
Question 229: Several universities are participating in a collaborative re...
Question 230: An analyst is reviewing logs associated with an attack. The ...
Question 231: The Chief information Security Officer wants to prevent exfi...
Question 232: A Chief Information Officer is concerned about employees usi...
Question 233: A company recently added a DR site and is redesigning the ne...
Question 234: A public relations team will be taking a group of guest on a...
Question 235: A news article states hackers have been selling access to Io...
Question 236: A company is implementing a new SIEM to log and send alerts ...
Question 237: Which of the following is MOST likely to outline the roles a...
Question 238: A security analyst is investigating some users who are being...
Question 239: Several attempts have been made lo pick the door lock of a s...
Question 240: A security analyst is reviewing web-application logs and fin...
Question 241: An organization has implemented a two-step verification proc...
Question 242: Leveraging the information supplied below, complete the CSR ...
Question 243: An engineer is setting up a VDI environment for a factory lo...
Question 244: A security researcher is tracking an adversary by noting its...
Question 245: Which of the following is a cryptographic concept that opera...
Question 246: Which of the following are the MOST likely vectors for the u...
Question 247: A developer is building a new portal to deliver single-pane-...
Question 248: An employee received multiple messages on a mobile device. T...
Question 249: A company just developed a new web application for a governm...
Question 250: The Chief Information Security Officer (CISO) has requested ...
Question 251: A junior security analyst is conducting an analysis after pa...
Question 252: A company wants to improve end users experiences when they t...
Question 253: Which of the following allows for functional test data to be...
Question 254: All security analysts workstations at a company have network...
Question 255: Hackers recently attacked a company's network and obtained s...
Question 256: A security analyst is performing a forensic investigation co...
Question 257: A security engineer is setting up passwordless authenticatio...
Question 258: one of the attendees starts to notice delays in the connecti...
Question 259: A company is providing security awareness training regarding...
Question 260: A forensics investigator is examining a number of unauthoriz...
Question 261: Certain users are reporting their accounts are being used to...
Question 262: A user reports trouble using a corporate laptop. The laptop ...
Question 263: A company is setting up a web server on the Internet that wi...
Question 264: An organization just experienced a major cyberattack modem. ...
Question 265: A system administrator needs to implement an access control ...
Question 266: Which of the following control Types would be BEST to use in...
Question 267: An analyst visits an internet forum looking for information ...
Question 268: A company recently experienced an inside attack using a corp...
Question 269: A penetration tester gains access to the network by exploiti...
Question 270: A startup company is using multiple SaaS and IaaS platform t...
Question 271: A security policy states that common words should not be use...
Question 272: Which of the following is assured when a user signs an email...
Question 273: After a hardware incident, an unplanned emergency maintenanc...
Question 274: Which of the following in the incident response process is t...
Question 275: In the middle of a cybersecurity, a security engineer remove...
Question 276: A security analyst is reviewing the following attack log out...
Question 277: A cloud service provider has created an environment where cu...
Question 278: Which of the following should be put in place when negotiati...
Question 279: Users reported several suspicious activities within the last...
Question 280: A security analyst is reviewing logs on a server and observe...
Question 281: A recently discovered zero-day exploit utilizes an unknown v...
Question 282: Which of the following conditions impacts data sovereignty?...
Question 283: A Chief information Officer is concemed about employees usin...
Question 284: A forensics investigator is examining a number of unauthoriz...
Question 285: While investigating a data leakage incident, a security anal...
Question 286: Which of the following processes will eliminate data using a...
Question 287: An organization Chief information Security Officer a positio...
Question 288: A Chief Security Officer is looking for a solution that can ...
Question 289: A company is implementing a DLP solution on the file server....
Question 290: An analyst Is generating a security report for the managemen...
Question 291: A security architect at a large, multinational organization ...
Question 292: The security administrator has installed a new firewall whic...
Question 293: An n that has a large number of mobile devices is explonng e...
Question 294: A security administrator needs to create a RAIS configuratio...
Question 295: A Chief Information Security Officer (CISO) needs to create ...
Question 296: Which of the following authentication methods sends out a un...
Question 297: While reviewing pcap data, a network security analyst is abl...
Question 298: An organization has been experiencing outages during holiday...
Question 299: A security analyst is reviewing the following attack log out...
Question 300: A network analyst is investigating compromised corporate inf...
Question 301: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 302: A client sent several inquiries to a project manager about t...
Question 303: An annual information security assessment has revealed that ...
Question 304: An organization's policy requires users to create passwords ...
Question 305: Which of the following is a known security nsk associated wi...
Question 306: A company recently experienced an attack in which a maliciou...
Question 307: Select the appropriate attack and remediation from each drop...
Question 308: During an incident response, an analyst applied rules to all...
Question 309: Which of the following incident response steps occurs before...
Question 310: A security administrator is trying to determine whether a se...
Question 311: The IT department at a university is concerned about profess...
Question 312: A security modern may have occurred on the desktop PC of an ...
Question 313: While investigating a data leakage incident a security analy...
Question 314: A security analyst is investigation an incident that was fir...
Question 315: Which of the following explains why RTO is included in a BIA...
Question 316: To mitigate the impact of a single VM being compromised by a...
Question 317: A company recently transitioned to a strictly BYOD culture d...
Question 318: A company needs to validate its updated incident response pl...
Question 319: A company recently moved sensitive videos between on-premise...
Question 320: A security team suspects that the cause of recent power cons...
Question 321: An attacker is exploiting a vulnerability that does not have...
Question 322: A security analyst receives a SIEM alert that someone logged...
Question 323: A security engineer is setting up passwordless authenticatio...
Question 324: A security analyst is reviewing the following output from a ...
Question 325: A company has discovered unauthorized devices are using its ...
Question 326: An organization has hired a security analyst to perform a pe...
Question 327: Which of the following is a benefit of including a risk mana...
Question 328: If a current private key is compromised, which of the follow...
Question 329: A privileged user at a company stole several proprietary doc...
Question 330: A security engineer needs to enhance MFA access to sensitive...
Question 331: An analyst is trying to identify insecure services thal are ...
Question 332: A company processes highly sensitive data and senior managem...
Question 333: A security analyst is Investigating a malware incident at a ...
Question 334: The IT department at a university is concerned about profess...
Question 335: Which of the following would be indicative of a hidden audio...
Question 336: An application developer accidentally uploaded a company's c...
Question 337: An organization is developing an authentication service for ...
Question 338: An organization is repairing the damage after an incident, W...
Question 339: A user reports constant lag and performance issues with the ...
Question 340: A security engineer is setting up passwordless authenticatio...
Question 341: An organization is having difficulty correlating events from...
Question 342: A security analyst receives a SIEM alert that someone logged...
Question 343: A security administrator is trying to determine whether a se...
Question 344: A security analyst is investigating suspicious traffic on th...
Question 345: An organization is building backup sever moms in geographica...
Question 346: An analyst visits an internet forum looking for information ...
Question 347: A security engineer is setting up passwordless authenticatio...
Question 348: Which of the following would BEST provide detective and corr...
Question 349: An attacker has successfully exfiltrated several non-salted ...
Question 350: A forensics investigator is examining a number of unauthoriz...
Question 351: An attacked is attempting to exploit users by creating a fak...
Question 352: During an investigation, the incident response team discover...
Question 353: An analyst is trying to identify insecure services thal are ...
Question 354: An organization implemented a process that compares the sett...
Question 355: Joe. a security analyst, recently performed a network discov...
Question 356: The security administrator has installed a new firewall whic...
Question 357: Select the appropriate attack and remediation from each drop...
Question 358: A security analyst receives a SIEM alert that someone logged...
Question 359: When selecting a technical solution for identity management,...
Question 360: The Chief Information Security Officer wants to prevent exfi...
Question 361: During a security assessment, a security analyst finds a fil...
Question 362: Joe, an employee, receives an email stating he won the lotte...
Question 363: A security analyst needs to determine how an attacker was ab...
Question 364: During an incident response, a security analyst observes the...
Question 365: A major clothing company recently lost a large amount of pro...
Question 366: A workwide manufacturing company has been experiencing email...
Question 367: A forensics investigator is examining a number of unauthoriz...
Question 368: A cyberthreat intelligence analyst is gathering data about a...
Question 369: A company was compromised, and a security analyst discovered...
Question 370: A security engineer needs to Implement the following require...
Question 371: As part of annual audit requirements, the security team perf...
Question 372: Which of the following are the MOST likely vectors for the u...
Question 373: A security administrator checks the table of a network switc...
Question 374: During a recent penetration test, the tester discovers large...
Question 375: A large financial services firm recently released informatio...
Question 376: A company was compromised, and a security analyst discovered...
Question 377: An organization is moving away from the use of client-side a...
Question 378: A security analyst is concerned about traffic initiated to t...
Question 379: Administrators have allowed employees to access their compan...
Question 380: A security analyst is investigating an incident that was fir...
Question 381: A financial analyst has been accused of violating the compan...
Question 382: A security analyst is evaluating the risks of authorizing mu...
Question 383: Select the appropriate attack and remediation from each drop...
Question 384: Which of the following will provide the BEST physical securi...
Question 385: The IT department's on-site developer has been with the team...
Question 386: A company discovered that terabytes of data have been exfilt...
Question 387: Which of the following is the BEST action to foster a consis...
Question 388: A security administrator needs to create a RAID configuratio...
Question 389: A Chief Security Officer (CSO) is concerned about the volume...
Question 390: The security administrator has installed a new firewall whic...
Question 391: A security analyst is Investigating a malware incident at a ...
Question 392: Which of the following concepts BEST describes tracking and ...
Question 393: The following are the logs of a successful attack. (Exhibit)...
Question 394: During an incident response process involving a laptop, a ho...
Question 395: A systems administrator is looking for a solution that will ...
Question 396: A user reports constant lag and performance issues with the ...
Question 397: hich of the folowing would be BEST for a technician to revie...
Question 398: A root cause analysis reveals that a web application outage ...
Question 399: A security engineer is setting up passwordless authenticatio...
Question 400: A systems analyst is responsible for generating a new digita...
Question 401: An attacker is attempting to exploit users by creating a fak...
Question 402: Which of the following policies establishes rules to measure...
Question 403: An organization is having difficulty correlating events from...
Question 404: An application owner has requested access for an external ap...
Question 405: An end user reports a computer has been acting slower than n...