Which of the following BEST describes the attack vector used to infect the devices?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed.

Which of the following BEST describes the attack vector used to infect the devices?
A . Cross-site scripting
B . DNS poisoning
C . Typo squatting
D . URL hijacking

Answer: C

Leave a Reply

Your email address will not be published.