Difficulty: Easy
Correct Answer: CMOS
Explanation:
Introduction / Context:
Classic computer viruses target executable code and boot processes. Understanding what they can and cannot infect helps triage incidents and choose the right remediation steps (e.g., boot sector repair, file disinfection, media scanning).
Given Data / Assumptions:
Concept / Approach:
Viruses replicate by attaching to executable code or modifying boot sectors. While malware can alter CMOS settings (e.g., change time or boot order) via BIOS calls, CMOS itself is not executable storage that gets “infected” with code. In contrast, program files and boot sectors are frequent infection targets, and removable media like floppy disks commonly spread such infections.
Step-by-Step Solution:
Verification / Alternative check:
Incident response playbooks focus on scanning file systems and boot areas, not on “disinfecting” CMOS. Clearing CMOS may undo malicious setting changes but is not disinfection of code.
Why Other Options Are Wrong:
Common Pitfalls:
Confusing altered CMOS settings with infection; overlooking that firmware rootkits target flash ROM, not CMOS RAM.
Final Answer:
CMOS
Discussion & Comments