Which commonly assessed category of cognition as part of neuropsychological evaluation comprises interrelated self-regulatory control processes involved in the selection, initiation, organization, execution, and monitoring of goal-directed behavior?
Which of the following is a defense mechanism that offers ex…
Which of the following is a defense mechanism that offers explanation to justify beliefs or behaviors that otherwise would be unacceptable?
The start of human development has historically been conside…
The start of human development has historically been considered at birth; however, the effects on development that happen as a result of intrauterine events include
In a recent poll, 63% of respondents indicated that they wer…
In a recent poll, 63% of respondents indicated that they were “worried” about climate change. If one of the sample subjects in this poll were selected at random, what is the probability of that person having said they were “not worried” about climate change?
In psychiatry, which of the following is a common reason to…
In psychiatry, which of the following is a common reason to refer a patient for a neuropsychological evaluation?
When a PMHNP suspects child maltreatment, they should
When a PMHNP suspects child maltreatment, they should
Which of the following interventions is considered the leadi…
Which of the following interventions is considered the leading approach with the most evidence when treating a child who has trauma-related symptoms from child maltreatment?
Which of the following is an example of the Id guiding one’s…
Which of the following is an example of the Id guiding one’s behavior?
We studied hardware support that is provided by modern proce…
We studied hardware support that is provided by modern processor architectures to protect TCB data and code from untrusted user code. In particular, we examined in detail the hardware support provided by successive generations of Intel processors. Answer the following questions for these processors. Provide a brief explanation that justifies your answer. In the protected mode, what descriptor protection level (DPL) is used for a segment that has TCB or kernel code and data? Also, what page protection level (PPL) is used for pages that store such segment code/data? (2+2 pts.) Does kernel code always execute at the highest privilege level? Explain your answer. (1+2 pts.) The MOV instruction in the Intel instruction set architecture can be used to move data between registers and memory. It can also be used to load certain control registers like CR3 which stores page table base address. Consider two cases where the MOV instruction is used to load a value stored in a memory location into (i) the stack pointer register (ESP), and (ii) the CR3 register. Can the MOV instruction in each of these cases be executed by user-level code? Is MOV a privileged instruction every time it is used or it depends on its operands? Explain your answer. (4+2+2 pts.) True or false: With the VT-x virtualization extensions and a Type I hypervisor, a system call made by user code always requires processor mode to change from non-root to root. Briefly explain your answer. (2+2 pts.) True or false: With the Intel SGX extensions, successful exploitation of a hypervisor vulnerability can result in the disclosure of sensitive data that should only be accessed inside an enclave by the enclave’s code. Briefly explain your answer. (2+2 pts.)
MidtermFormulaSheet2023-2.pdf
MidtermFormulaSheet2023-2.pdf