exam questions

Exam 220-1102 All Questions

View all questions & answers for the 220-1102 exam

Exam 220-1102 topic 1 question 501 discussion

Actual exam question from CompTIA's 220-1102
Question #: 501
Topic #: 1
[All 220-1102 Questions]

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS, the malware infection returned later that day. Which of the following is the most likely source?

  • A. Trojan
  • B. Boot sector virus
  • C. Spyware
  • D. Rootkit
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Philco
Highly Voted 8 months, 3 weeks ago
Answer is B--A boot sector virus is a type of malware that infects a computer's boot sector, which is a reserved area on a disk that contains the instructions needed to start the operating system. The virus loads itself into the device's memory as soon as the computer boots up, before security software can run
upvoted 5 times
Philco
8 months ago
Bootkits are very similar to rootkits, but instead of infecting the kernel, they go for the Master Boot Record (MBR) or the Volume Boot Record (VBR). MBRs and VBRs are records stored in your computer's disk that help to start (or 'boot') your operating system from the hard drive when you first turn on your computer.
upvoted 1 times
...
...
3352234
Most Recent 1 week, 5 days ago
Selected Answer: B
most logical answer
upvoted 1 times
...
Nate_A
5 months, 3 weeks ago
Most voted is answer B, but it is still listing D as correct...
upvoted 1 times
...
UncleSmurf
9 months, 2 weeks ago
Selected Answer: D
Answer is D
upvoted 1 times
...
d7328bb
1 year ago
Selected Answer: D
it is D
upvoted 1 times
...
jennycertrain
1 year ago
Selected Answer: D
It is D
upvoted 1 times
...
yutface
1 year ago
Selected Answer: D
D. Rootkit Rootkits are particularly stealthy and persistent forms of malware that can embed themselves deeply within the operating system. Even after reinstalling the OS, if a rootkit is present, it can remain undetected and continue to infect the system. Rootkits often have the capability to reinstall themselves even after system reinstallation or other remediation attempts. Therefore, a rootkit is the most likely source of the persistent malware infection in this scenario. Both GPT and Gemini seem to agree.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago