Answer: C) spin-lock with test and set
Explanation:
In spinlock, when a thread locks a spinlock then it continuously retrying locking until it succeeds. Spinlock is the lock that cause thread and continuously check that whether the lock are available or not for synchronization.
So that is why spinlock is best synchronization solution as it is not allowing any another thread.
On the other hand, in mutex thread try to lock a mutex and then, it automatically go to sleep mode before locking and immediate allow another thread to run.
According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).
Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.
The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.
Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>
Learn more about <u>penetration testing</u> here: brainly.com/question/13137421
Answer: Virtual desktop infrastructure
Explanation:
The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system) is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.
The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.
All the other options does not involve with this technology so that is why option (D) is correct.
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address. The device with that IP address will then respond with it's MAC address to the ARP message's source.
With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
My phone duhhh. If I hadn’t had a phone I wouldn’t be able to send streaks...