GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

These questions are from the discretionary and mandatory acc…

These questions are from the discretionary and mandatory access control modules. All students in a class belong to a group G and are able to access class resources because G is granted the necessary permissions. Assume Alice has tested out of a topic and does not need to take the quiz on this topic. The professor does not want Alice to have access to this quiz but wants Alice to remain in group G so she can access other resources. Also, the professor wants to grant access to the quiz to all other students by granting the desired access to G. The mechanisms provided by various operating systems can be used to meet this access control requirement. Explain how this can be achieved most efficiently and correctly in Linux with extended access control lists (EACLs) and in Windows. First, provide the access control entries (ACEs) with their types and permissions for the quiz in each system. After this, discuss which of these ACEs will be checked when Alice tries to access the quiz. (2+2+2+2  pts.) The Bell and La Padula (BLP) and Biba models address confidentiality and integrity of data in a system that supports mandatory access control.. A system follows the read-down rule of BLP, but writes by a user are only allowed at the user’s level (no writes to higher levels are allowed). Does this system satisfy the requirements of the BLP and Biba models? First, describe the BLP and Biba requirements and then explain if the requirements of each model are satisfied. (2+2+2+2 pts.) If both models are used simultaneously by a system and object O has the highest sensitivity level (e.g., top secret), what level of integrity should be assigned to O based on Biba? Is there a drawback to using both of these models at the same time? Provide a brief explanation. (1+2 pts.) A certain company has many customers and some of them have conflict-of-interest (CoI) relationships. Also, employees can only access company data by executing applications approved by the company based on their roles or functions in the company. The people responsible for access provisioning in this company came up with the following scheme.  All files of a given customer must be stored in a single directory. Initially, users are allowed to execute applications based on their needs and each application can access files needed by it. Access could be removed when applications execute. In particular,  when user U executes application A which accesses files from customer C’s directory, access to all files in directories of customers who have a CoI relationship with C is turned off for application A when it is executed by U.   Give two examples of policies discussed in the mandatory access control module of the course that could be used to control access to documents by this company. Explain your answer by discussing the specific access requirements identified by the company that are satisfied by each policy. (4+4 pts.)  Does the suggested implementation correctly implement each policy that you recommend for the company? Provide a brief justification for your answer. (2+2 pts.)

Read Details

Jacinda is a 11-year old child diagnosed with spastic cerebr…

Jacinda is a 11-year old child diagnosed with spastic cerebral palsy who presents with motor issues in both upper extremities and her left leg, as well as difficulty with articulation. She has received occupational therapy services in her public school since the age of three and transitioned into a new school district last month. She has already been evaluated by PT and speech. The school OT has just been asked to complete an evaluation, but only has time for 15 minutes to observe Jacinda in school, review her classwork, and complete an occupational profile. The OT has already spoke with Jacinda’s parents, and will have a meeting with the classroom teacher, aide, and staff about Jacinda today. Which of the following standardized assessment tools makes sense to use in this case?

Read Details

Henry is a 7-year old that was recently evaluated for occupa…

Henry is a 7-year old that was recently evaluated for occupational therapy services using a standardized assessment tool. The tool is NORM-referenced provides information about Henry’s functional skills as well as the amount of support he needs to complete those skills. Which of the following assessments COULD provide this information? Select all that apply.

Read Details

Standardized tests can be given in a non-standardized way. W…

Standardized tests can be given in a non-standardized way. Which of the following represents an APPROPRIATE reason for giving a standardized test in a non-standardized way?

Read Details

Which of the following is an appropriate reason to use a scr…

Which of the following is an appropriate reason to use a screening tool, such as the Hawaii Early Learning Profile (HELP) for a child with a suspected disability?

Read Details

Alice was born on June 30, 2009. The Sensory Profile-2 Child…

Alice was born on June 30, 2009. The Sensory Profile-2 Child (SP-2) assessment was completed on March 15, 2021. What is her chronological age on the date of testing?

Read Details

Which of the following is NOT a short-term supply chain deci…

Which of the following is NOT a short-term supply chain decision?

Read Details

Which of the following is a characteristic of forecasts?

Which of the following is a characteristic of forecasts?

Read Details

The R Markdown and Jupyter Notebook files include the questi…

The R Markdown and Jupyter Notebook files include the questions, the empty code chunk sections for your code, and the text blocks for your responses. Answer the questions below by completing either the R Markdown or the Jupyter Notebook file.  You will submit an pdf file created using either template.  You may make slight adjustments to get the file to knit/convert but otherwise keep the formatting the same. Once you’ve finished answering the questions, submit your responses in a single knitted file (just like the homework data analysis assessments). There are two questions  within each with sub-questions. The number of points for each question is provided for each question. Partial credit may be given if your code is correct but your conclusion is incorrect or vice versa. Next Steps: Save the template of your choice in your R working directory – the same directory where you will download the data file for this midterm exam. Having both files in the same directory will help in reading the .csv file. Read the question and create the R code necessary within the code chunk section immediately below each question. Knitting this file will generate the output and insert it into the section below the code chunk. Type your answer to the questions in the text block provided immediately after the response prompt. Once you’ve finished answering all questions, knit this file and submit the knitted file as PDF on Canvas. You will also have the option to submit an csv file with your predictions.  Please note that there will be a penalty applied to your grade if you do not submit the html file (if you submit instead the unknitted file). Make sure to knit your work as you answer the questions one by one to avoid issues with knitting the file in the last minutes of the exam. Ready? Let’s begin. We wish you the best of luck! Data Set  (right-click the link and select to open in new window/tab)   Midterm 1 SP 2025.csv Midterm 1 Spring 2025.Rmd Midterm 1 Spring 2025 Template.rmd R Markdown Starter Template Midterm 1 Spring 2025.rmd  Jupyter Notebook Starter Template Midterm 1 Spring 2025.ipynb

Read Details

An MRCP is used to visualize which anatomic structures?​1. G…

An MRCP is used to visualize which anatomic structures?​1. Gallbladder​2. Biliary system​3. Kidney

Read Details

Posts pagination

Newer posts 1 … 37,597 37,598 37,599 37,600 37,601 … 84,534 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top