Describe a boot sector virus.

What will be an ideal response?


Boot sector virusesposition their code in the boot sector of a computer's hard disk so that when the computer boots up, the virus runs in place of the computer's normal system files. Boot sector viruses are commonly spread from external storage devices to hard disks. Boot sector viruses vary in their destructiveness. Some merely display a screen advertising the virus's presence when you boot the infected computer. Others do not advertise themselves, but stealthily destroy system files or make it impossible for the file system to access at least some of the computer's files. Examples of boot sector viruses include Michelangelo and the Stoned virus, which was widespread in the early 1990s (in fact, it disabled U.S. military computers during the 1991 Persian Gulf War) and persists today in many variations. Until you disinfect a computer that harbors a boot sector virus, the virus propagates to every external disk to which that computer writes information. Removing a boot sector virus first requires rebooting the computer from an uninfected, write-protected disk with system files on it. Only after the computer is booted from a source other than the infected hard disk can you run software to remove the boot sector virus.

Computer Science & Information Technology

You might also like to view...

The main threat involving wireless access points is unauthorized access to the network. The principal approach for preventing success is the __________ standard for port-based network access control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using the Package Presentation for CD feature enables a user to view presentations on a computer system that ________

A) does not have Windows 7 B) does not have remote access C) does not have PowerPoint D) does not have the Internet

Computer Science & Information Technology

What are the #region and #endregion keywords used for?

What will be an ideal response?

Computer Science & Information Technology

An administrator suspects that packets to an IP address are being dropped over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets?

A. ping B. nslookup C. traceroute D. netstat

Computer Science & Information Technology