Which malware rewrites the boot record with malicious code, which, when executed, gains access and installs the malicious payload?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which malware rewrites the boot record with malicious code, which, when executed, gains access and installs the malicious payload?

Explanation:
Manipulating the startup sequence by rewriting the boot record is a disk-focused attack. By changing the boot sector or the Master Boot Record on the storage device, the malware ensures its code runs before the operating system loads, giving it control to gain access and install the payload. This pattern is characteristic of disk-based malware, since the infection resides on the disk’s boot region and leverages the boot process itself. It’s not about code running only inside the CPU after startup, nor about payloads delivered through USB storage or macros in documents. So the correct category is disk-based malware.

Manipulating the startup sequence by rewriting the boot record is a disk-focused attack. By changing the boot sector or the Master Boot Record on the storage device, the malware ensures its code runs before the operating system loads, giving it control to gain access and install the payload. This pattern is characteristic of disk-based malware, since the infection resides on the disk’s boot region and leverages the boot process itself. It’s not about code running only inside the CPU after startup, nor about payloads delivered through USB storage or macros in documents. So the correct category is disk-based malware.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy