Which virus is described as targeting the File Allocation Table on FAT file systems to disrupt file access?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which virus is described as targeting the File Allocation Table on FAT file systems to disrupt file access?

Explanation:
This question focuses on how malware can directly corrupt file access by manipulating filesystem metadata, specifically on FAT file systems. The File Allocation Table is the map that tells the system which clusters belong to each file. A FAT virus alters entries in this table, so the OS follows incorrect cluster chains or marks clusters as bad. As a result, files can become inaccessible, corrupted, or appear missing because the data location pointers are no longer accurate. This behavior is unique to a virus designed to target the FAT structure itself. The other options describe different malware behaviors that don’t hinge on corrupting the FAT. File extension viruses change file names or extensions to deceive users rather than disrupt how the file system locates data. A logic bomb activates payload when a condition is met but doesn’t specifically manipulate the FAT to disrupt access. Web scripting viruses spread through malicious scripts on web pages and target browsers or web applications, not the local filesystem’s allocation table.

This question focuses on how malware can directly corrupt file access by manipulating filesystem metadata, specifically on FAT file systems. The File Allocation Table is the map that tells the system which clusters belong to each file. A FAT virus alters entries in this table, so the OS follows incorrect cluster chains or marks clusters as bad. As a result, files can become inaccessible, corrupted, or appear missing because the data location pointers are no longer accurate. This behavior is unique to a virus designed to target the FAT structure itself.

The other options describe different malware behaviors that don’t hinge on corrupting the FAT. File extension viruses change file names or extensions to deceive users rather than disrupt how the file system locates data. A logic bomb activates payload when a condition is met but doesn’t specifically manipulate the FAT to disrupt access. Web scripting viruses spread through malicious scripts on web pages and target browsers or web applications, not the local filesystem’s allocation table.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy