Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed. Which of the following BEST describes the attack vector used to infect the devices?

A. Cross-site scripting
B. DNS poisoning
C. Typo squatting
D. URL hijacking


Answer: C. Typo squatting

Computer Science & Information Technology

You might also like to view...

Which recovery option would allow a user to reinstall Windows on a home computer that did not come with any Windows disc?

A) Recovery partition B) System Restore C) Safe Mode D) Virtual Machine

Computer Science & Information Technology

Which of the following commands deletes an index?

A. DELETE INDEX B. REMOVE INDEX C. UNINDEX D. DROP INDEX

Computer Science & Information Technology

Which of the following LAN layouts is one in which all microcomputers and other communications devices are connected to a central server?

A) Bus network B) Ring network C) Star network D) All of the above E) None of the above

Computer Science & Information Technology

In the figure above, the Permissions tab allows you to create a certificate that identifies who you are to the user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology