Difficulty: Easy
Correct Answer: CMOS
Explanation:
Introduction / Context:
Classic DOS-era malware most commonly targeted executable files and boot records because those vectors let malicious code execute at startup or when launching programs. Understanding which components are normally impacted, and which are not, helps you triage symptoms and choose appropriate remediation steps like scanning media, rewriting a boot sector, or restoring clean program files.
Given Data / Assumptions:
Concept / Approach:
Boot-sector viruses alter the Master Boot Record or volume boot sector to gain control early in the boot sequence. File infectors attach to or replace COM/EXE files to execute when a program runs. Removable floppies can spread infection by carrying infected boot records or executables. In contrast, CMOS mainly stores hardware configuration values (for example, date, time, drive geometry) and is not the usual target for self-replicating DOS malware. While a minority of malicious programs might attempt to corrupt CMOS settings, that behavior is uncommon compared to file and boot vectors, and standard exam convention treats CMOS as the item not normally affected.
Step-by-Step Solution:
Verification / Alternative check:
Run an antivirus scanner that reports infected files and boot sectors. Observe that detections occur on COM/EXE files and boot records far more often than on CMOS settings. Resetting CMOS typically addresses configuration, not malware persistence.
Why Other Options Are Wrong:
Common Pitfalls:
Confusing CMOS corruption due to battery failure with virus behavior, and assuming that cleaning files will remove a boot-sector virus without rewriting the boot record.
Final Answer:
CMOS
Discussion & Comments