PdfPrep.com

Which of the following BEST describes the attack vector used to infect the devices?

Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed.

Which of the following BEST describes the attack vector used to infect the devices?
A . Cross-site scripting
B . DNS poisoning
C . Typo squatting
D . URL hijacking

Answer: C

Exit mobile version