1, I do. The imagination isn’t a perfect replacement for everything, and I find visualising things far harder to do if I’m actively forcing myself to do it (listening to music or just letting my mind wander is far better for me, so this test is pretty difficult for me since I have to force myself to focus on the apple).
I still remember hearing about a Ring 0 exploit in Windows (I may be misremembering, though) that required Ring 0 access. I think if an attacker has access to Ring 0, you’re already screwed anyway.